Our thoughts, industry views and technology trends

All posts by Paul Kenyon

Don’t blame cyber attackers for data breaches, blame a lack of preparation

Cyber attackers are savvy, their methods are sophisticated, and we in the InfoSec community need to get over it.

At the Check Point Cyber Security Symposium in Sydney last week, Telstra CIO, Mike Burgess criticized those organizations that overly focus on attributing cyber attacks, or blaming ‘sophisticated’ attackers for their networks being compromised.

 

Continue Reading


The simple way to mitigate over 90% of Critical Microsoft Vulnerabilities

Unconvinced about the importance of removing user admin rights? Read on for some compelling reasons why user privileges should be at the top of your security agenda in 2014.

 

Continue Reading


Microsoft extends limited security support for Windows XP – but is this enough?

Microsoft has announced that it will continue to provide updates to its anti-malware signatures and engine for Windows XP users until July 14th, 2015. But what does this really mean?

The end of support for the operating system as a whole is April 8th, 2014, and this extended security service isn’t enough to keep organizations secure.

 

Continue Reading


Turning Concern into Action

Edward Snowden’s data leakage at the NSA has certainly caused a ripple effect across the entire IT landscape, forcing organizations across all industries to take a closer look at their current security defenses. At the McAfee FOCUS conference in October this year, we conducted a survey to examine just how closely security professionals were rethinking their approaches to security as a result of the NSA incident. And just as important – if not more – was determining how many of those professionals were actually converting these attitudes to action.

 

Continue Reading


How to deliver ultimate security whilst reducing costs

64% of IT security professionals believe malware incidents to be a significant reason for the increase in IT operating expenses (2013 State of The Endpoint, Ponemon)

Today’s malware is increasingly sophisticated, taking advantage of normal user behavior to gain a foothold within your organization.  Web browsers, media plugins, Java exploits and removable media are amongst the most common vectors of introduction and each of these require an unknowing user at the keyboard to access the ‘trojan’ content.

 

Continue Reading