Skip to main content

Why can’t you detect breaches?

BreachRecent reports of the Hilton Hotel Group’s Point of Sale (POS) systems being breached in order for hackers to gain access to credit card data were the latest in a series of attacks directed at the hospitality sector. These have proven that today’s advanced threats and targeted attacks are easily able to bypass standard security defences and remain undetected for long periods of time while exfiltrating valuable information.

According to John Mc Loughlin, MD of J2 Software, organisations whose security strategies focus on products and tools such as access control and identity management will have problems, as today’s advanced threats cannot be prevented using yesterday’s controls, or without an understanding of the threats themselves.

“POS systems in hospitality and retail usually run on Windows operating systems, as do ATM’s – the same operating system that most PCs and laptops run on. That makes it much easier for cyber criminals to gain entry into these machines than organisations realise. Companies need to actually know what is going on at the end points in order to mitigate attacks,” he says.

Read more …Why can’t you detect breaches?

  • Hits: 2213

Best-of-Class Collaboration Spells the End for Traditional Security Vendors

CISOs Demand Interoperability of Elite Behavioral and Predictive Analytics Security Technologies To Effectively Thwart Evolving Cybersecurity Threats

August 03, 2015 12:00 PM

Eastern Daylight TimeSAN FRANCISCO--(BUSINESS WIRE)--Bay Dynamics®, the market leader in cyber risk predictive analytics, today announced a strategic technology alliance with Dtex Systems, a global insider threat protection company. The two companies will work together to streamline interoperability between their industry-leading solutions with the aim of solving broader enterprise security problems.

“Enterprise CISOs can no longer rely on large, monolithic security vendors to provide a ‘one stop shop’. Frankly, they are not agile enough to respond quickly and effectively within the rapidly evolving enterprise security threat landscape. We need best-of-class solutions to integrate and work together in a seamless manner, and vendors must have a truly collaborative and unselfish mindset in order to deliver and address wide-scale enterprise security requirements,” said Robert Rodriguez, Chairman and Founder of the Security Innovation Network (SINET). “Bay Dynamics and Dtex are a great example of how effective this collaboration can be. Their alliance not only underscores the opportunity for behavioral and predictive analytics, content aggregation, and endpoint monitoring to solve the biggest problems for enterprise security today but more importantly the vision and fortitude to do so.”

Read more …Best-of-Class Collaboration Spells the End for Traditional Security Vendors

  • Hits: 1919

Managing organisational risk

J2 software Managing organisational riskOrganisational risk can be reduced to two base constituents: loss or diminished profit, and loss of stability. Similarly, for any tool or technology to be valuable, it must do two of three things - improve profit, reduce loss or improve the risk against loss, and maintain organisational stasis and stability.

So says Kevin Halkerd, senior security specialist at J2 Software. “Companies who are not on the map in terms of using tools that accomplish that, are already handicapped.”

At the same time, the adoption of new technologies, and the management thereof, will add to risk. He cites the example of BYOD, where in an effort to remove the end-user computing environment cost, users were introduced to bringing their own devices, or in some industries, choosing their own devices.

“Trends like BYOD will always bring more risk. Even with the latest security apps and devices, your company data and app access may be safe, but these things aren’t easily managed on employees’ devices. Any particular technology landscape requires a long term business commitment. Businesses can be influenced by a slick mobile device marketing campaign driving the latest Android or iOS device for example, and these devices change, every year. This is what is happening now, companies are going for the latest and greatest, and sensitive data can be lost when businesses don’t keep with up the BYOD trend rationally.”

Read more …Managing organisational risk

  • Hits: 2162

Stop security gaps as they occur

South African organisations are increasingly looking to protect themselves against the insider threat, says John Mc Loughlin, MD of J2 Software. This is as the result of more stringent compliance and regulatory requirements, as well as the higher profile of insider breaches.

“SystemSkan’s unique technology has become renowned worldwide for its ability to identify insider threats immediately with total end-user visibility so the gaps in security can be closed as they occur. It is always better to stop the threat than to read about the data leak in the news, and we have seen substantially increased demand from local companies for the solution,” he says.

Read more …Stop security gaps as they occur

  • Hits: 1835

The new security frontier: the insider

Businesses are under siege. While security has been a constant concern for companies since they started using the Internet to connect to the outside world, today’s proliferation of connected devices, distributed networks and increasingly militant cyber criminals has placed security front and centre for any organisation wanting to remain in business.

Add to this the fact that even small companies are falling prey to hackers and thieves, and that legislation such as the Protection of Personal Information Act is placing increasing pressure on businesses to ensure their data remains secure, and it’s no wonder that reports estimate that South African businesses lost an estimated R5.8bn to cybercrime.

Read more …The new security frontier: the insider

  • Hits: 1983