Industries — Opinions

Turning the Tables on Cyber Attackers

Whoever said the best defence is a strong offence could have been thinking of protecting the enterprise from “advanced threats”. Given the stealth of today’s advanced attack malware, the scale of data compromise and speed of execution, it has been proven time and again that relying on a passive, defensive security strategy is no longer adequate.

Nick Race | 17 Apr | Read more

The Active International Response to Cyber Crime

The international cyber-security versus cyber-crime battle is gathering pace and what we’re seeing is the formation of international alliances to fight this rising scourge. However, the online world is unlike any other, it will take more than a defensive mindset to win this battle.

Mark Gregory | 26 Mar | Read more

Is your Board Cyber Ready?

Over the last few years the topic of cyber security has gone mainstream. It’s now being actively discussed in boardrooms. The years 2012-2014 will go down in history as a period when many major corporations were breached, with the Sony Pictures hack becoming a landmark moment—nation-state actors got involved and executive orders authorising political sanctions were issued.

Puneet Kukreja | 26 Mar | Read more

Return on Prevention: The Business Value of DDoS Protection

DDoS attacks are continuing to evolve and the last 12 months has seen huge growth in the number and size of the attacks going on in Australia. When we couple this with businesses’ increasing reliance on Internet connectivity, for either revenue or access to cloud based data and applications; protection from the DDoS threat should be a top priority.

Nick Race | 09 Mar | Read more

Interpreting Data

The recent article by Cristian Florian, Most vulnerable operating systems and applications in 2014', was a huge hit, generating hundreds of comments and often heated debates and criticism. His analysis was also picked up by leading tech publications, generating even more chatter. What stood out is that IT professionals are really passionate about their favourite platform. This is a huge positive in the IT world as it helps a platform evolve beyond the efforts of its official maintainers and the results benefit everyone.

Emmanuel Carabott | 09 Mar | Read more

How SSL encryption gives a false sense of security

Major web browsers and many web sites rely on the Secure Sockets Layer (SSL) protocol, which encrypts confidential information, such as credit card numbers, before sending them securely over the internet. SSL encryption ensures that email, e-commerce, voice-over-IP, online banking, remote health and countless other services are kept secure.

Ananda Rajagopal | 03 Mar | Read more

Do you know the “Three Cs” of web app security?

We live in an application world. From shopping to communicating with friends, reading the news, following our favourite sports teams to listening to music – we do it through apps. With so many interactions and transactions now taking place via apps, maintaining security is becoming a big concern.

Matt Miller | 20 Feb | Read more

App Security- the great unspoken

There is no shortage of conversation around enterprise security. In light of some recent, high-profile hacking incidents, everyone’s talking about the importance of securing networks, data and devices in avoiding a worst case scenario of confidential customer or organisational information or IP being compromised. Interestingly, these conversations often neglect one vital component- the applications that operate on these systems and how their own vulnerabilities can bring down an organisations’ entire security strategy.

Mav Turner | 20 Feb | Read more

The Real Security Gap: Users

With security breaches set to become more commonplace, enterprise IT teams have to be more vigilant and find new ways of combating these attacks. Cyberattacks on Australian companies, such as the recent hacking on major travel insurance company Aussie Travel Cover, have left many organisations feeling vulnerable.

Travis Greene | 18 Feb | Read more

Integrated Threat Defence: Joining Forces to Defend Against Cyber Attacks

Today’s security landscape is constantly changing. Attackers are becoming more sophisticated and nimble, leading to new threats and attacks evolving every day. Tailor-made, stealthy threats now routinely evade traditional, point-in-time security defences by using multiple attack vectors. Further, advanced attacks use whatever unprotected paths exist - often blending paths - to compromise targets. Cyber criminals continue to go to great lengths to remain undetected, using technologies and methods that result in nearly imperceptible Indications of Compromise (IoCs). At the same time, the attack surface is increasing because modern networks are evolving, extending beyond traditional walls to include public and private data centres, endpoints, virtual machines, mobile devices, and the cloud.

Anthony Stitt | 18 Feb | Read more

Password Protection: How Far Can Hackers Get?

For years, passwords have been the dominant means by which organisations authenticate customer access to online services. Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.

Steve Durbin | 13 Jan | Read more

Why businesses have never been more vulnerable to large DDoS attacks

Recently there has been an almost constant feed of news around distributed denial of service (DDoS) attacks, with banks, gaming organisations, governments, educational establishments and e-commerce vendors all being attacked. The DDoS threat has evolved considerably over recent years, with significant changes in the frequency and scale of attacks, and the motivations of cyber criminals. And, over a similar period, many organisations have become highly dependent on the availability of Internet services for their business continuity.

Nick Race | 12 Jan | Read more