Network Security — Opinions

Cyberwar Incident Response at the Speed of Thought

In a combat situation, our soldiers wear and carry different types and amounts of equipment, compared to when they are on normal duties. In some high risk situations they’re expected to carry around 60 kilograms worth of kit, including their gun, ammunition, armour, helmet and boots.

Nick Race | 12 Apr | Read more

Do you have an Insider Threat Program?

Insider threats are increasingly on our radar, we saw a recent example in Australia with an Bluescope Steel employee taking out company documents. Also two scientists at Glaxo Smith Kline research scientists in another well publicised incident- Yu Xue and Lucy Xi, were charged with stealing trade secrets.

David Gee | 01 Apr | Read more

Reminiscing about identity and access management (IAM)

Graham Williamson is Senior Analyst at KuppingerCole and covers the areas of Identity-as-a-Service, Dynamic Authorisation Control and Privacy. He has consulted in the Identity Management sector for 15 years and is the author of the book “Identity Management: A Primer”. Graham holds a bachelor of Applied Science degree from the University of Toronto and an MBA degree from Bond University. He has practical experience in the identity management and access control industry having completed assignments in the academic, government and large corporate industry sectors across three continents.

Graham Williamson | 30 Mar | Read more

Turning the Tables on Cyber Attackers

Whoever said the best defence is a strong offence could have been thinking of protecting the enterprise from “advanced threats”. Given the stealth of today’s advanced attack malware, the scale of data compromise and speed of execution, it has been proven time and again that relying on a passive, defensive security strategy is no longer adequate.

Nick Race | 17 Apr | Read more

The Next Generation of Assessing Information Risk

Digital information is the heart of today’s organisations. It’s growing exponentially, and its effective use and management is directly linked to the continued success of the modern enterprise. However, digital technologies and global interconnection have introduced a significant number of new risks and greatly amplified existing ones. There are now many significant, high-profile examples of information risks being realised, and their impacts continue to grow. Organisations simply must improve their management of information risk.

Steve Durbin | 30 Mar | Read more

Best ways to protect Ecommerce site from cyber criminals

With the festive season fast approaching, online retailers everywhere will be busily preparing themselves to meet the bulk demands of customers but another community is also waiting in the wings. The festive season is a primetime for nefarious cyber criminals or hackers looking to steal important data of your customers. With passage of time, hackers are improving their skills and are founding quite innovative ways to trace online behavior and steal credentials of the customers.

Joy Mali | 20 Mar | Read more

App Security- the great unspoken

There is no shortage of conversation around enterprise security. In light of some recent, high-profile hacking incidents, everyone’s talking about the importance of securing networks, data and devices in avoiding a worst case scenario of confidential customer or organisational information or IP being compromised. Interestingly, these conversations often neglect one vital component- the applications that operate on these systems and how their own vulnerabilities can bring down an organisations’ entire security strategy.

Mav Turner | 20 Feb | Read more

Why businesses have never been more vulnerable to large DDoS attacks

Recently there has been an almost constant feed of news around distributed denial of service (DDoS) attacks, with banks, gaming organisations, governments, educational establishments and e-commerce vendors all being attacked. The DDoS threat has evolved considerably over recent years, with significant changes in the frequency and scale of attacks, and the motivations of cyber criminals. And, over a similar period, many organisations have become highly dependent on the availability of Internet services for their business continuity.

Nick Race | 12 Jan | Read more

The Rise of the Cyber Mafia

“There is no clouding the fact that security threats are increasing. Hackers are becoming more advanced in their techniques and with more devices being connected than ever before, it is becoming easier to spread malicious software. The situation is only going to get worse, as companies run from fire to fire, securing whatever is most important right now.”

Ian Hodge | 19 Dec | Read more

Identifying the visibility gaps in your security

‘Once more unto the breach’…When Henry V uttered those immortalised words in Shakespeare’s play; most enemy attacks were fought on the battlefield. Yet in modern times, many ambushes come in the form of cyber attacks that wreak havoc in the shadows. These data breaches affect all organisations, not just governments, and also more commonly small and mid-sized businesses.

Brett Moorgas | 10 Dec | Read more

Identity governance: It’s all about the people

New technologies like bring your own identity (BYOI) provide the agility that organisations need to compete in the digital economy, as Jan Zeilinga demonstrated in last month’s blog. But let’s not forget that getting the house in order is an important prerequisite to going “digital”. Employees and contractors need access to the right information to do their jobs, and organisations need to ensure that digital assets are used appropriately.

John Havers | 10 Dec | Read more