Marc Maiffret

Type: Person
Name: Marc Maiffret
First reported Apr 15 2014 - Updated Apr 15 2014 - 1 reports

BeyondTrust Launches BeyondInsight 5.1

BeyondTrust, a company that specializes in context-aware security intelligence solutions, has updated its IT risk management platform BeyondInsight.BeyondInsight 5.1 enables IT and security teams to easily import QualysGuard vulnerability data via a new ... [Published Softpedia - Apr 15 2014]
First reported Apr 12 2014 - Updated Apr 12 2014 - 1 reports

NSA denies report that it used Heartbleed bug to capture information

The National Security Agency on Friday strongly denied a news report that said the government failed to warn the public about the notorious Heartbleed software flaw -- allegedly because the NSA wanted to continue using it to gather intelligence.The story, ... [Published San Jose Mercury News - Apr 12 2014]
First reported Apr 08 2014 - Updated Apr 08 2014 - 1 reports

Patch Tuesday: Last call for Windows XP

This Patch Tuesday has much more significance than most. With only four security bulletins from Microsoft, it's relatively tame as far as Patch Tuesdays go, but today also marks the final patches and updates from Microsoft for Windows XP .“So this is ... [Published PC World - Apr 08 2014]
First reported Apr 04 2014 - Updated Apr 04 2014 - 1 reports

BeyondTrust Chief Technology Officer Marc Maiffret to Speak at ISSA-LA...

Security research pioneer, cybersecurity visionary and winner of numerous product awards, Marc Maiffret, discovered the first Microsoft computer worm, “CodeRed” and was named one of People Magazine’s “30 People Under 30” Marc Maiffret, Chief Technology ... [Published PRWeb - Apr 04 2014]
First reported Apr 03 2014 - Updated Apr 03 2014 - 1 reports

Forgotten risks hide in legacy systems

These days, there’s no shortage of new business technologies and new threat vectors to the enterprise. But what many companies forget is that old technologies pose risks as well, and those risks aren’t going away. In fact, as your legacy systems continue ... [Published CSO Magazine - Apr 03 2014]
First reported Apr 01 2014 - Updated Apr 02 2014 - 1 reports

Reports of NSA's Deeper Involvement With RSA Raise Questions

Security experts examine whether there's reason to worry about the latest disclosure that the NSA had more impact on RSA cryptography.Reports that the NSA's involvement with RSA Security's cryptographic tools was greater than first claimed raise many ... [Published eWeek - Apr 01 2014]
First reported Mar 26 2014 - Updated Mar 26 2014 - 1 reports

Re: On Phillippe Courtot's RSAC Keynote

Posted by Marc Maiffret on Mar 26 Attackers and exploitation tools are false negative heavy. Not allexploits have the same reliability as to not produce false negatives.This could be as simple as an IT person using a default Metasploitexploit which simply ... [Published Daily Dave - Mar 26 2014]
First reported Mar 23 2014 - Updated Mar 23 2014 - 2 reports

NSP Microcast – RSAC2014 – BeyondTrust

I had a chance to sit down with  BeyondTrust  CTO, Marc Maiffret.  I’ve had conversations with Marc before, but I haven’t seen him since he has been at BeyondTrust, so I took this time to find out what they do and how it would be used by the average ... [Published Network Security Blog - Mar 23 2014]
First reported Mar 13 2014 - Updated Mar 13 2014 - 1 reports

A No Bullshit Look at the Infosec Industry: An Interview with BeyondTrust’s CTO

Sat in the BeyondTrust glass cube meeting room on the RSA Conference show floor in San Francisco, Marc Maiffret, CTO of BeyondTrust, shares his thoughts on the information security market with me in the only way he knows how – sans “bullshit”. Look around ... [Published Infosecurity Today - Mar 13 2014]
First reported Mar 11 2014 - Updated Mar 12 2014 - 3 reports

Microsoft Patches IE Zero-Day in March Patch Tuesday

Microsoft released five patches—two rated as "Critical" and three as "Important"—fixing 23 vulnerabilities in Internet Explorer, Microsoft Windows, and Silverlight as part of March's Patch Tuesday update. The IE patch also closed the zero-day vulnerability ... [Published PC Magazine - Mar 12 2014]
First reported Mar 12 2014 - Updated Mar 12 2014 - 1 reports

ISSA-LA Sixth Annual Information Security Summit on Cybercrime...

Cybersecurity Expert Richard A. Clarke and Los Angeles County District Attorney Jackie Lacey to Keynote as well as other numerous prominent information security experts and representatives from law enforcement The Los Angeles Chapter of the Information ... [Published PRWeb - Mar 12 2014]
First reported Feb 11 2014 - Updated Feb 13 2014 - 1 reports

Microsoft Patches Critical Internet Explorer, Windows Vulnerabilities

Microsoft added two new security updates into the mix of Patch Tuesday bulletins being released today. The additions - critical updates for Internet Explorer and the VBScript scripting engine - bring the total number of vulnerabilities addressed in ... [Published SecurityWeek RSS Feed - Feb 11 2014]

Quotes

...Qualys customers who are unable to generate the reports that they require leveraging the Qualys platform," said Marc Maiffret, CTO, BeyondTrust. "while in many cases customers are able to completely switch vulnerability management platforms, there are other times where heavy investments in qualys leave them with more of a staged replacement approach. with these new capabilities to report on qualys data, customers can now receive the most advanced reporting and analytics via the beyondinsight platform while leveraging their existing qualys scanner engines."
"this again calls into discussion the right balance of modern intelligence agencies needing undisclosed vulnerabilities for espionage activities, while balancing how much those vulnerabilities also expose the very companies and countries they are meant to be protecting" said Maiffret
..."While the NSA has done many things to help improve Internet security, there are also many instances where they have weakened it," Maiffret said. "companies like rsa that are selling a solution to a problem should know fully their solution, even the parts of it that might have come as ideas from academia or the government; otherwise technology companies will find themselves an easy pass-through for subversion."

More Content

All (21) | News (14) | Reports (0) | Blogs (7) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
BeyondTrust Launches BeyondInsight 5.1 [Published Softpedia - Apr 15 2014]
BeyondTrust Brings Business Intelligence to the... [Published Finwin - Apr 15 2014]
BeyondTrust Brings Business Intelligence to the... [Published BusinessWeek - Apr 15 2014]
NSA denies report that it used Heartbleed bug t... [Published San Jose Mercury News - Apr 12 2014]
Microsoft Issues Final XP, Office 2003 Updates ... [Published PC Magazine - Apr 08 2014]
Patch Tuesday: Last call for Windows XP [Published PC World - Apr 08 2014]
Last Call for XP, Office 2003 Updates: April Pa... [Published threatpost - The First Stop for Security News - Apr 08 2014]
BeyondTrust Chief Technology Officer Marc Maiff... [Published PRWeb - Apr 04 2014]
Forgotten risks hide in legacy systems [Published CSO Magazine - Apr 03 2014]
Reports of NSA's Deeper Involvement With RSA Ra... [Published eWeek - Apr 01 2014]
Re: On Phillippe Courtot's RSAC Keynote [Published Daily Dave - Mar 26 2014]
NSP Microcast – RSAC2014 – BeyondTrust [Published Network Security Blog - Mar 23 2014]
NSP Microcast – RSAC2014 – BeyondTrust [Published Security Bloggers Network - Mar 23 2014]
A No Bullshit Look at the Infosec Industry: An ... [Published Infosecurity Today - Mar 13 2014]
ISSA-LA Sixth Annual Information Security Summi... [Published PRWeb - Mar 12 2014]
Microsoft Patches IE Zero-Day in March Patch Tu... [Published PC Magazine - Mar 12 2014]
Microsoft Closes Critical IE Security Vulnerabi... [Published Security Week - Mar 11 2014]
Microsoft Closes Critical IE Security Vulnerabi... [Published SecurityWeek RSS Feed - Mar 11 2014]
Microsoft Patches Critical Internet Explorer, W... [Published SecurityWeek RSS Feed - Feb 11 2014]
BeyondTrust CTO, Marc Maiffret, Lends Insight a... [Published Security Bloggers Network - Nov 12 2013]
Facebook Hacker To Get Reward From Fellow Hackers [Published Silicon India - Aug 21 2013]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Last Call for XP, Office 2003 Updates: April Pa... [Published threatpost - The First Stop for Security News - Apr 08 2014]
As expected , Microsoft issued its final epitaph for Windows XP today, pushing out four security bulletins for 11 vulnerabilities, including the last updates for the oft-maligned, thirteen-year-old operating system.  Despite it being XP’s last gasp ...
Re: On Phillippe Courtot's RSAC Keynote [Published Daily Dave - Mar 26 2014]
Posted by Marc Maiffret on Mar 26 Attackers and exploitation tools are false negative heavy. Not allexploits have the same reliability as to not produce false negatives.This could be as simple as an IT person using a default Metasploitexploit which simply ...
NSP Microcast – RSAC2014 – BeyondTrust [Published Network Security Blog - Mar 23 2014]
I had a chance to sit down with  BeyondTrust  CTO, Marc Maiffret.  I’ve had conversations with Marc before, but I haven’t seen him since he has been at BeyondTrust, so I took this time to find out what they do and how it would be used by the average ...
NSP Microcast – RSAC2014 – BeyondTrust [Published Security Bloggers Network - Mar 23 2014]
I had a chance to sit down with BeyondTrust CTO, Marc Maiffret.  I’ve had conversations with Marc before, but I haven’t seen him since he has been at BeyondTrust, so I took this time to find out what they do and how it would be used by the average enterprise.  ...
Microsoft Closes Critical IE Security Vulnerabi... [Published SecurityWeek RSS Feed - Mar 11 2014]
The bad news - attackers have continued to leverage a highly-publicized Internet Explorer vulnerability. The good news is however that vulnerability now has a patch. Inside the five security bulletins Microsoft released today for Patch Tuesday is ...
1 2
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.