- June 15th, 2015
Cyber attackers are savvy, their methods are sophisticated, and we in the InfoSec community need to get over it.
At the Check Point Cyber Security Symposium in Sydney last week, Telstra CIO, Mike Burgess criticized those organizations that overly focus on attributing cyber attacks, or blaming ‘sophisticated’ attackers for their networks being compromised.
- February 20th, 2014
Unconvinced about the importance of removing user admin rights? Read on for some compelling reasons why user privileges should be at the top of your security agenda in 2014.
- February 12th, 2014
Microsoft has announced that it will continue to provide updates to its anti-malware signatures and engine for Windows XP users until July 14th, 2015. But what does this really mean?
The end of support for the operating system as a whole is April 8th, 2014, and this extended security service isn’t enough to keep organizations secure.
- November 19th, 2013
Edward Snowden’s data leakage at the NSA has certainly caused a ripple effect across the entire IT landscape, forcing organizations across all industries to take a closer look at their current security defenses. At the McAfee FOCUS conference in October this year, we conducted a survey to examine just how closely security professionals were rethinking their approaches to security as a result of the NSA incident. And just as important – if not more – was determining how many of those professionals were actually converting these attitudes to action.
- July 9th, 2013
64% of IT security professionals believe malware incidents to be a significant reason for the increase in IT operating expenses (2013 State of The Endpoint, Ponemon)
Today’s malware is increasingly sophisticated, taking advantage of normal user behavior to gain a foothold within your organization. Web browsers, media plugins, Java exploits and removable media are amongst the most common vectors of introduction and each of these require an unknowing user at the keyboard to access the ‘trojan’ content.