Category: Spotlight on Security

Appier Demonstrates Efficacy of Artificial Intelligence in Fighting Ad Fraud

Appier Demonstrates Efficacy of Artificial Intelligence in Fighting Ad Fraud

Real world study of Appier’s network shows significant benefits of AI over traditional rule-based systems Appier has shared the results of a real-world study that it conducted on its own network to demonstrate the ability of an AI-based model to fight ad fraud. Based on data over four months from May to August this year involving […]

The premise of personal risk management skills: Why we should start with the fundamentals

The premise of personal risk management skills: Why we should start with the fundamentals

The complexities and threats of our fast paced and modern world have never been more diverse or challenging than they are now, ranging from ever evolving cybercrime, modern day terrorism to old fashioned violent assault and petty crime. In addition, the fast-paced world, and the way we live brings levels of stress and pressure that […]

Hackers are humans: let’s beat them with soldiers

Hackers are humans: let’s beat them with soldiers

In terms of the security of our information systems, it is my opinion that western materialism is contributing to Australia’s growing cyber risk. We are increasingly viewing our information systems as an entity that can be defended with a one stop shop of cyber security products. This type of thinking is leaving our economy and […]

Spy spotting : What careless mistakes reveal about cyberespionage in APAC

Spy spotting : What careless mistakes reveal about cyberespionage in APAC

Errors and small clues left behind by attackers are vital in attribution, providing valuable intelligence on the people behind a cyberespionage attack and the possible connections between them. Kaspersky Lab’s researchers have been tracking advanced cyberespionage operations originating in and targeting Asia Pacific countries for the last 10 years, and have undertaken a review of […]

Akamai Identified As A DDoS Mitigation Leader By Independent Research Firm

Akamai Identified As A DDoS Mitigation Leader By Independent Research Firm

Report Cites That 24% of Global Enterprises That Suffered a Data Breach Over the Past 12 Months Were Victims of a DDoS Attack Akamai Technologies has announced that it was among the select companies that Forrester invited to participate in: The Forrester Wave: DDoS Mitigation Solutions, Q4 2017 evaluation. In this evaluation, Akamai was cited […]

The New Mafia: Gangs and Vigilantes

The New Mafia: Gangs and Vigilantes

A Guide to Cybercrime for CEOs Executive Summary As the name implies, cybercrime is a technologically advanced iteration of traditional crime taking place in the virtual world. Though the nuances of cybercrime are unclear to many, the structure, execution and malice are reminiscent of those historically practiced within criminal organizations. ‘The new mafia: gangs and vigilantes. A guide […]

Q3 2017 Akamai State of the Internet / Security Report Reveals Significant Increase in Web Application Security Attacks, Evolution of Attacker Strategies

Q3 2017 Akamai State of the Internet / Security Report Reveals Significant Increase in Web Application Security Attacks, Evolution of Attacker Strategies

Holiday shopping season may see new attack types leveraging IoT devices, mobile platforms Newly released data shows that web application attacks continued to rise significantly in both the quarter-over-quarter and year-over-year timeframes, according to the Third Quarter, 2017 State of the Internet / Security Report released by Akamai Technologies. In addition, further evaluation of the […]

The future of apps in a multicloud world: F5 agility 2017

The future of apps in a multicloud world: F5 agility 2017

Cloud, mobility, and the Internet of Things continue to elevate Apps to the core of business plans. As organisations undergo digital transformation, optimising applications for actionable intelligence and generating a business return remains a challenge. A multi- Cloud strategy is seen as the key to minimising the risks of ‘keeping all eggs in one basket’, […]

ASD Case Study highlights serious gaps in cybersecurity by defence contractors

ASD Case Study highlights serious gaps in cybersecurity by defence contractors

In November 2016, tipped off by a ‘partner organisation’ advising that an ‘APT actor’ had gained administration access to a fourth-tier defence contractor, ASD and CERT Australia were rapid to respond and on site the following day. Though on arrival, without official ASD credentials, the ‘customer’, a small aerospace engineering firm, with about 50 employees, […]

Cyber defense in depth: high walls alone won’t defend the castle

Cyber defense in depth: high walls alone won’t defend the castle

By Mike stone For business and government, cyber security is the new arms race. We defend, and the enemy counters. We respond, and so do they. The cycle escalates in perpetuity. A strong cyber defense is an integral part of good IT operations. Operate and defend are effectively two sides of the same coin and […]