PHOENIX, Feb. 21, 2018 -- BeyondTrust, the leading cyber security company dedicated to preventing privilege misuse and stopping unauthorized access, today announced the availability of a new book, Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations. The book, authored by BeyondTrust’s Chief Technology Officer, Morey Haber, and Chief Operating Officer, Brad Hibbert, and published by Apress, details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organizations must adopt to protect against a breach, protect against lateral movement, and improve the ability to detect hacker activity or insider threats in order to mitigate the impact.
In BeyondTrust’s recent survey Five Deadly Sins of Privileged Access Management, 86 percent of the nearly 500 IT professionals surveyed reported that the misuse of personally identifiable information was an issue that kept them up at night. Not surprisingly, Forrester research found that 80 percent of data breaches are the result of the abuse or misuse of privileged credentials1.
“We have privileged credentials and over-privileged users virtually everywhere and they all need to be managed for a business to stay secure,” said Morey Haber, Chief Technology Officer at BeyondTrust. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats that can present a game over event for a business or its team members. We’re excited to deal with this complex topic head-on in a comprehensive manner in the book which will be a valuable resource to individuals and enterprises alike.”
The book identifies how identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack and breach an environment. It presents an overview of 12 logical steps in the following areas:
- Implement a secure privileged attack defensive
- Comply with privileged regulatory audit requirements
- Mitigate privileged threats through least privilege, access control, and session management
- Incorporate credential and password best practices to secure privileged access in any environment
- Integrate privileged access management into your existing systems and workflow
“As cyber-attacks continue to increase in volume and sophistication, it is not a matter of if, but when your organization will be breached,” said Brad Hibbert, Chief Operation Officer at BeyondTrust. “Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges. Our hope is our new book will help users understand the risks and build a solid defense to protect their most prized credentials.”
About BeyondTrust
BeyondTrust is a global information security software company that helps organizations prevent cyber attacks and unauthorized data access due to privilege abuse. Our solutions give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Access Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com.
Follow BeyondTrust
Twitter: http://twitter.com/beyondtrust
Blog: www.beyondtrust.com/blog
LinkedIn: http://www.linkedin.com/company/beyondtrust
Facebook: http://www.facebook.com/beyondtrust
For BeyondTrust:
Mike Bradshaw
Connect Marketing for BeyondTrust
P: (801) 373-7888
E: [email protected]
1 1 The Forrester Wave™: Privileged Identity Management, Q3 2016. Forrester. Andras Cser. July 8, 2016.


Samsung Electronics Sees Sustained AI-Driven Demand for Memory Chips Into Next Year
Standard Chartered Names Peter Burrill as Interim Group CFO Following Diego De Giorgi’s Exit
SMIC Shares Slide Despite Strong AI-Driven Earnings as Margin Pressure Looms
Trump Administration Plans Chip Tariff Exemptions for Big Tech Amid AI Data Center Push
Air New Zealand Cabin Crew Strike Set for February 12–13 Amid Failed Talks
Alphabet Plans Rare 100-Year Sterling Bond to Fund AI Expansion
Macquarie Group Shares Jump as Third-Quarter Trading Conditions Improve Across Key Units
Petrobras Posts Record Oil Exports as Production Surge Fuels Global Expansion
AST SpaceMobile Joins MSCI ACWI Index as Largest New Addition, Boosting Market Visibility
SpaceX Pivots Toward Moon City as Musk Reframes Long-Term Space Vision
xAI Co-Founder Jimmy Ba Departs as Elon Musk’s AI Startup Faces Turbulence
American Airlines CEO to Meet Pilots Union Amid Storm Response and Financial Concerns
Taiwan Says Moving 40% of Semiconductor Production to the U.S. Is Impossible
Ancora Holdings Builds $200M Stake in Warner Bros Discovery, Targets Netflix Asset Sale Plan
CBA Shares Surge After Record Half-Year Profit as Rate Outlook Improves
Salesforce Workforce Reduction Affects Fewer Than 1,000 Roles Amid Ongoing Restructuring
ByteDance Advances AI Chip Development With Samsung Manufacturing Talks 



