- January 20th, 2016
If you can contain or block threats before they hit the endpoint with network-based security such as detection and sandboxing, that is always a good idea. The problem is that if you don’t secure the endpoints first, you end up with an eggshell security stance, where you are reliant on a single outer shell to protect your data. Without secure endpoints, even one small crack in the network shell will cause all of your data to spill out, creating a real mess..
- August 18th, 2015
During August members of the InfoSec community leave the comfort of their ergonomic desks and head out into the Nevada desert on a spiritual pilgrimage to Las Vegas. This mass movement is no coincidence, the draw is clear with Black Hat, DEF CON, BSides Vegas and the Star Trek Convention all occurring within a week. If you have an interest in offensive security, protecting data or ensuring your car cannot be remotely hijacked, Las Vegas is the place to be in August.
- June 15th, 2015
Cyber attackers are savvy, their methods are sophisticated, and we in the InfoSec community need to get over it.
At the Check Point Cyber Security Symposium in Sydney last week, Telstra CIO, Mike Burgess criticized those organizations that overly focus on attributing cyber attacks, or blaming ‘sophisticated’ attackers for their networks being compromised.
- April 27th, 2015
Last week saw the start of RSA 2015, the annual gathering of security professionals and vendors from across the world in San Francisco. In the opening session, Amit Yoran, president of RSA, declared that InfoSec needed to escape the dark ages.
- December 18th, 2014
As 2014 draws to a close, many in the InfoSec community are looking back on what has been an eventful past 12 months.
In both scale and sophistication, 2014 has been a game changer. In the first nine months alone there were as many as 1,922 confirmed incidents with criminals managing to compromise 904 million records*. Household names, from Sony and Home Depot to JP Morgan and Kmart, have been compromised and new, ever more potent forms of malware have risen to the surface.