phone number

Archive for the ‘ARTICLES ’ Category

Bark and Bite? The Essential Facts on the POODLE Vulnerability

Posted on: October 23rd, 2014 by

By ASM

Trustwave

The latest high-profile internet weakness, known as POODLE, lies in SSL version 3.0. Trustwave Threat Intelligence Manager Karl Sigler studied the vulnerability. In a new blog, he answers the big questions on people’s minds and explains how Trustwave can help … READ ALL ABOUT IT HERE

The post Bark and Bite? The Essential Facts on the POODLE Vulnerability appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Bark and Bite? The Essential Facts on the POODLE Vulnerability

  

Australia’s National Safety and Security Planning succumbs to the ‘Pike Syndrome’

Posted on: October 23rd, 2014 by

By ASM

HSAP

By Roger Henning
Homeland Security Asia/Pacific

Australia’s security planners have succumbed to the ‘Pike Syndrome’; now requiring an urgent need for an immediate paradigm shift in problem solving – including the approach, thinking and deployment of available resources – by those charged with responsibility for National Security, in Australia, according to Homeland Security Asia/Pacific!

HSAP January 2014 recommendations, aimed at improving G20 security, by introducing enhanced mitigation strategies, to increase capabilities, by using all resources, were sent to all Ministers involved in planning security for the Summit.

Security was breached inside Parliament House, Canberra, on 31 August 2012, when a Russian protestor threw a letter at then PM Julia Gillard; recently at the White House and now the Parliament of Canada, has been forced into lockdown. All these facilities have a high security presence, but none use A1A methodology involving the training and empowerment of all staff from cleaners to advisors – the greatest asset at any work location – especially Houses of Parliament.

Fatal events in Canada this week, proved conclusively, reliance on ‘more of the same’ technology and an armed law enforcement presence, is not and never will be a total solution to threats posed by ‘lone wolf’ attackers – even if they are not radicalized Islamic extremists. The hits in Canada will encourage IS-inspired terrorists to launch attacks, in the knowledge soft targets are easy to penetrate and destroy, in Australia and worldwide.

Western nations, including Australia, are guilty of succumbing to the ‘Pike Syndrome’ locked into old methodology of problem solving and resource usage, when the need is for a holistic all-encompassing approach.

The ‘lone wolf’ threat will not be mitigated, until Governments are willing to look outside the square. HSAP has achieved this over the last six years by developing United Nations ICAO-compliant A1A, which is used to train and engage any work force on all designated “Places of Mass Gathering”, including Parliament House Canberra, the Lucas Heights nuclear facility, airports, seaports, rail and bus terminals, sports stadiums and key installations.

One of the softest high-yield targets in Australia would be any invitation-only VIP Airport Lounge, when full of Parliamentarians. Terrorists are not all ‘dickheads’ as described by a newly elected NSW Senator. Saudi born 9/11 attackers were highly educated, patient planners, disciplined and horrifyingly successful.

The post Australia’s National Safety and Security Planning succumbs to the ‘Pike Syndrome’ appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australia’s National Safety and Security Planning succumbs to the ‘Pike Syndrome’

  

Good Technology Acquires Macheen, Inc

Posted on: October 22nd, 2014 by

By APSM

Good Technology Logo

Good Technology, the leader in secure mobility, has announced its acquisition of Macheen, Inc., a privately held, mobile cloud application service provider based in Austin, Texas. Terms of the deal were not disclosed.

Building on the company’s recent hassle-free BYOD announcement, this acquisition further enhances Good Technology’s capabilities to provide customers with embedded corporate data plan support across business-required apps, and broadens Good’s carrier relationships, offering organisations more access and choice to work with their preferred wireless operator. Additionally, these new split-billing capabilities will enable customers to tie data usage costs directly to the apps using that data, reducing regulatory risks associated with traditional mobile billing models.

“As BYOD deployments continue to become mainstream, our customers want to alleviate the risk and cost associated with rapidly increasing mobile regulations, tax liabilities and complexities around mobile reimbursement and corporate stipend programs, while at the same time carriers are looking to better serve their enterprise customers,” said Christy Wyatt, chairman and chief executive officer, Good Technology. “By acquiring Macheen and its cloud-based offering, and coupling that with expanded carrier relationships, we will be securely and cost-effectively taking more friction out of deploying secure mobile apps and workflows – further positioning Good ahead of the industry in the race to democratise mobility.”

“At Sprint, we have ripped out and replaced our entire 3G network and deployed 4G LTE in 488 cities to deliver a future-proof data experience for our customers,” said Karen Freitag, vice president, wholesale and emerging solutions at Sprint. “Adding in the ability to deliver split billing capabilities through Macheen and now Good Technology, allows us to continue delivering a high-quality customer experience and further advances Sprint’s position as the leader in enabling Mobile Virtual Network Operators (MVNO).”

Connected mobile devices are growing at an exponential rate, and enterprises are looking at how to capitalise on supporting more than just enterprise devices. According to Gartner, ” The installed base of “things,” excluding PCs, tablets and smartphones, will grow to 26 billion units in 2020, which is almost a 30-fold increase from 0.9 billion units in 2009. The component cost of Internet of Things (IoT)-enabling consumer things will approach $1, and “ghost” devices with unused connectivity will be common.

“To this point, BYOD programs were generally defined by configuration, policy control and device management for smart phones and tablets,” said Richard Schwartz, president and chief executive officer, Macheen, Inc. “Together, our joint technology will offer controlled corporate usage of a broader set of enterprise devices and beyond as the era of Internet of Things (IoT) becomes a reality.”

Macheen serves businesses of all sizes, including Easter Seals UCP North Carolina and Virginia, enabling its mobile healthcare workforce to stay connected to critical HIPAA-compliant applications, while visiting hospitals and other healthcare facilities.

…read more

Source: Good Technology Acquires Macheen, Inc

  

F5 Web Application Firewall Achieves “Recommended” Status from NSS

Posted on: October 22nd, 2014 by

By APSM

f5-networks-logo

F5 Networks has announced it has been identified as one of the industry’s top Web Application Firewall (WAF) vendors in recent benchmarking reports from NSS Labs. Specifically, F5’s BIG-IP Application Security Manager (ASM) was evaluated alongside other vendors’ offerings, earning “Recommended” status for its performance across a number of product and comparative analysis tests.

Key findings and lab results revealed that F5’s BIG-IP ASM 10200:

  • Proved effective against all evasion techniques tested
  • Passed all stability and reliability tests
  • Blocked 99.21% of WAF attacks
  • Rated at 36,130 connections per second (CPS)

“Enterprises increasingly rely on web applications to deliver mission-critical services to customers,” said Vikram Phatak, CEO at NSS Labs. “Web Application Firewalls are what keep those applications safe. Being recommended by NSS is not easy. F5’s BIG-IP ASM 10200 earned its ‘Recommended’ status by demonstrating extremely high protection coupled with low false positive rates, excellent performance, and overall value.”

NSS evaluated vendor solutions based on several security, performance, and total cost of ownership (TCO) criteria. An NSS Labs “Recommended” rating indicates that a product demonstrates outstanding performance and deserves serious consideration from customers. This rating is reserved for only the top performing products, regardless of vendor market share, size, or industry presence.

“Analyst recognition like this provides further evidence of the compelling advantages F5 security solutions offer customers,” said Mark Vondemkamp, VP, Security at F5. “With application-focused products like BIG-IP ASM and Advanced Firewall Manager, we believe we can offer comprehensive scale/performance, IP intelligence, and multiprotocol security capabilities that other vendors can’t match.”

F5’s BIG-IP ASM was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Web Application Firewall Methodology v6.2 available at http://www.nsslabs.com/. The tests were conducted free of charge, and NSS did not receive any compensation in return for F5’s participation.

Availability

BIG-IP Application Security Manager is available now, as are additional solutions within F5’s security product portfolio.

…read more

Source: F5 Web Application Firewall Achieves “Recommended” Status from NSS

  

Akamai Warns of UPnP Devices Used in DDoS Attacks

Posted on: October 22nd, 2014 by

By ASM

Akamai Logo

Akamai Technologies, Inc, the leading provider of cloud services for delivering, optimising and securing online content and business applications, has released, through the company’s Prolexic Security Engineering & Response Team (PLXsert), a new cybersecurity threat advisory. The advisory alerts the security community, device vendors, Internet service providers and enterprises to the risk of massive distributed denial of service (DDoS) attacks involving Universal Plug and Play (UPnP) devices. The advisory is available for download from Prolexic (now part of Akamai) at www.prolexic.com/ssdp.

PLXsert has observed the use of a new reflection and amplification DDoS attack that deliberately misuses communications protocols that come enabled on millions of home and office devices, including routers, media servers, web cams, smart TVs and printers. The protocols allow devices to discover each other on a network, establish communication and coordinate activities. DDoS attackers have been abusing these protocols on Internet-exposed devices to launch attacks that generate floods of traffic and cause website and network outages at enterprise targets.

“Malicious actors are using this new attack vector to perform large-scale DDoS attacks. PLXsert began seeing attacks from UPnP devices in July, and they have become common,” said Stuart Scholly, senior vice president and general manager, Security Business Unit, Akamai. “The number of UPnP devices that will behave as open reflectors is vast, and many of them are home-based Internet-enabled devices that are difficult to patch. Action from firmware, application and hardware vendors must occur in order to mitigate and manage this threat.”

PLXsert found 4.1 million Internet-facing UPnP devices are potentially vulnerable to being employed in this type of reflection DDoS attack – about 38 percent of the 11 million devices in use around the world. PLXsert will share the list of potentially exploitable devices to members of the security community in an effort to collaborate with cleanup and mitigation efforts of this threat.

“These attacks are an example of how fluid and dynamic the DDoS crime ecosystem can be,” explained Scholly. “Malicious actors identify, develop and incorporate new resources and attack vectors into their arsenals. It’s predictable that they will develop, refine and monetise these UPnP attack payloads and tools in the near future.”

Get the SSDP Reflection Threat Advisory to learn more

PLXsert replicated an attack of this type in a lab environment, demonstrating how attackers produce reflection and amplification DDoS attacks using UPnP-enabled devices. In the advisory, PLXsert shares its analysis and details, including:

  • How the SSDP protocol and SOAP requests are used in reflection attacks
  • Two example DDoS tools used to scan for vulnerable devices and launch attacks
  • Details of an observed attack campaign
  • Geographical distribution of UPnP devices involved in attacks
  • Top 10 most common headers in UPnP response payloads
  • Recommended system hardening and community action
  • DDoS mitigation

A complimentary copy of the threat advisory is available for download at www.prolexic.com/ssdp.

The post Akamai Warns of UPnP Devices Used in DDoS Attacks appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Akamai Warns of UPnP Devices Used in DDoS Attacks

  

Unmanned Ground Vehicle Market worth $8.26 Billion by 2020

Posted on: October 22nd, 2014 by

By ASM

Markets Logo

This report provides a brief analysis of the application sectors of the market, emerging trends, and a detailed UAV market analysis of major countries from each region.

The major challenges include incorporating new technology before it matures and verifying the operational safety of the UGV. Survivability and adaptability to extreme environmental conditions is expected to restrain the market.

North America holds a share of almost 50% of the global market. Asia-Pacific is expected to indicate stringent growth with increasing investments in defense and commercial applications in emerging countries such as China and India. Technological advancements in UGVs, its success in combat performances, and the rising demand for non-defense applications is expected to drive the market in future. A reduction in risks to human life through UGV applications in hazardous and periculous circumstances is expected to trigger the market, globally.

Limited battery endurance to accomplish longer mission hours and defense budget cuts in the established North American and European regions restrict the UGV market growth. The increasing demand for autonomy and better operational efficiency will seek opportunities for the UGV growth.

Unmanned ground vehicle market is segmented based on categories-by type, by technology, by payloads, by application, by region, and by country. The competitive analysis includes the market share of companies in the market. The report includes an analysis of the impact of drivers and restraints country-wise and region-wise to provide a better insight of the UGV market. Technology and industry trends are also highlighted, which will provide competitive market intelligence to utilize the business opportunities.

Get a copy of the report, “Unmanned Ground Vehicle Market by Type, Technology, Payload , Application – Forecasts & Analysis – 2020 here

The post Unmanned Ground Vehicle Market worth $8.26 Billion by 2020 appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Unmanned Ground Vehicle Market worth $8.26 Billion by 2020

  

Seagate’s Luczo Named as one of the “Best-performing CEOs in the World” by Harvard Business Review

Posted on: October 22nd, 2014 by

By ASM

Seagate Logo

Harvard Business Review has ranked Seagate Chairman and CEO Steve Luczo as one of the best-performing CEOs in the world. Luczo was ranked No. 34 overall on the magazine’s global list of top 100 CEOs.

“I’m honored to be recognised by such a respected publication and alongside a collection of outstanding leaders,” said Steve Luczo, Seagate Chairman and CEO. “Seagate’s performance and reputation are a result of the collective effort and unwavering commitment of our employees around the world.”

Harvard Business Review primarily focused on total shareholder return and market capitalisation in determining their rankings; however, the magazine also examined reputation, strategic vision, authenticity, long-term planning and other “intangibles” in evaluating the world’s top CEOs. Seagate and Luczo ranked No. 32 in reputation, which included measuring products and services, innovation, workplace, governance, citizenship, leadership, and performance. Seagate was one of only five technology companies that made the top 40.

The magazine examined Seagate’s performance under Luczo’s leadership since his return as CEO in 2009. Over that period of time, total shareholder return (country adjusted) was 1,016% and total shareholder return (sector adjusted) was 958%. Also during that time, market capitalisation has increased $20 billion.

More information about Harvard Business Review’s list of the world’s best-performing CEOs can be found here.

The post Seagate’s Luczo Named as one of the “Best-performing CEOs in the World” by Harvard Business Review appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Seagate’s Luczo Named as one of the “Best-performing CEOs in the World” by Harvard Business Review

  

Tenable Incorporates Top Four ASD Strategies in Latest Release of SecurityCenter Continuous View Dashboard

Posted on: October 22nd, 2014 by

By ASM

Tenable Logo

New measures help organisations address security program weaknesses and identify vulnerabilities.

Tenable Network Security, Inc., the leader in continuous network monitoring, has released the latest version of its SecurityCenter Continuous View™ (SC CV) dashboard. Incorporating the top four strategies identified in the 2014 update of the Australian Signals Directorate’s (ASD) security publication, “Strategies to Mitigate Targeted Cyber Intrusions,” the new SecurityCenter CV dashboard adheres to government-mandated security requirements to bring greater visibility to security processes and enables organisations to address weaknesses or gaps in their security program and identify all of their vulnerabilities, eliminating blind spots in their network.

The ASD report found over 85 percent of the cyber intrusions that ASD responds to could be prevented by following four key mitigation strategies that address the following areas: application whitelisting, patching applications, patching operating system vulnerabilities and restrictions to administrative privileges.

The newly released SC CV dashboard introduces additional critical components to support the ASD’s top four strategies and provides security analysts with an instantaneous view of security findings.  At the same time, it leverages SC CV’s continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance, enabling organisations to react to advanced threats, zero-day vulnerabilities and new regulatory compliance requirements.

Solution components that provide insight into the top four ASD strategies include: Active OS and Application Vulnerability Counts, OS and Application Top Remediations, Application Top Remediations, OS Top Remediations, Passive OS and Application Vulnerability Counts, Group Membership Indicators, Software Modification Events and List of Software.

Security analysts can use the dashboard to obtain a quick situation overview or drill down into any component to obtain more granular information.  Additionally, dashboards can be customised to meet the unique reporting and monitoring needs of individual departments and organisations.

“The threat of targeted cyber intrusion has reached an all-time high but by implementing ASD’s recommended mitigations, an organisation can reduce the impact to Australia’s economic well-being and that of its citizens,” said Attley Ng, vice president of sales for APAC, Tenable Network Security. However, for any one organisation to implement all 35 strategies requires time and resources, and that raises the risk of delayed action because the project is too big. By packaging the top four strategies into the new SecurityCenter dashboard, organisations can act quickly to reduce risk for a relatively small investment of time, effort and money.”

Richard Byfield, Managing Director, Datacom TSS, said,  “The threat of targeted cyber intrusion has reached an all-time high but by implementing ASD’s Top 35 recommended mitigation strategy, an organisation can reduce the impact to Australia’s economic well-being and prevent data breaches. However, for any one organisation to implement all 35 strategies requires time and resources, and that raises the risk of delayed action because the project is too big.  By packaging the top four strategies into the new SC CV dashboard, organisations can gain the visibility they need to respond quickly to reduce and manage these risk for a relatively small investment of time, effort, and money.”

The post Tenable Incorporates Top Four ASD Strategies in Latest Release of SecurityCenter Continuous View Dashboard appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Tenable Incorporates Top Four ASD Strategies in Latest Release of SecurityCenter Continuous View Dashboard

  

Emsisoft wins Advanced+ at AV-Comparatives File Detection Test

Posted on: October 17th, 2014 by

By ASM

Emisoft

Whenever independent test lab AV-Comparatives conducts its File Detection Test of Malicious Software, you can count on two things.

  1. Lots of malware
  2. Emsisoft detecting most – if not all – of it.

99.3% blocked

This time around, there were 126,335 malware samples, and Emsisoft Anti-Malware blocked 99.3% of them. That’s earned us yet another AV-C Advanced+ Award. More importantly, though, it’s given our users just one more reason to trust Emsisoft for consistent protection against an ever-growing world of threats.

Very few false positive scares

Something else you can count on? Malware being scary. That’s why Emsisoft products are designed to warn and protect you ONLY IF the threat is real. AV-Comparatives’ latest File Detection test has also proven that Emsisoft Anti-Malware produces ‘very few’ false positive scares. How few was ‘very few’? 4, to be exact. That’s 30 times less than the product that came in last, at 120 false alarms. That’s also the difference between a product that can confidently discern between malicious and benign and one that will leave you second guessing yourself the next time you download a file you weren’t too sure about in the first place. The full September 2014 File Detection Test of Malicious Software results are available for download here.

Slideshow: “The Internet Is A Dangerous Place”

The most frightening thing about it? Malware authors are continually improving and inventing new threats. Today, most users who get infected don’t even realize it – and when they do, they’re left wondering how and why.

Check out Emsisoft’s Cybersecurity Awareness slideshow. Share some malware insights with your readers and shed some light on the scariest parts of the web and what’s motivating today’s cybercriminals.

The post Emsisoft wins Advanced+ at AV-Comparatives File Detection Test appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Emsisoft wins Advanced+ at AV-Comparatives File Detection Test

  

AirMax 5X completed the Video Surveillance Network Solutions

Posted on: October 17th, 2014 by

By ASM

AirLive Logo

Video Surveillance has grown increasingly popular around the word. Video surveillance has extended from office environments to production environments, from indoor to outdoor, and from local to remote. Due to those changes, video surveillance network has to adapt to multiple access scenarios and even to harsh environments.

With the development of technology and the industry trend, WLAN can provide wireless video surveillance access to commercial buildings and office environments and can use to implement remote video surveillance at long distances for places where routing cables is inconvenient.

As born as a network-expert, AirLive provides AirMax 5X (5GHz High Throughput Outdoor CPE with PoE Pass through) to fulfill the bandwidth demands of video surveillance. Furthermore, its network resources can even be shared with other services to reduce deployment costs.

Wireless Surveillance Network Topology

Wireless Surveillance Network Solution

 AirLive2

 

Long Distance & High Speed Transmission (10km & 300Mbps)

With the integrated directional 2T2R 14dBi 5GHz MIMO antenna and high output power AirMax5X/5X-20 signals can be transmitted to a long distance 10km /20km. The high transmission power and high gain provides longer distance and better signal; according to the field test, the throughput can be up to 77Mbps at 10km.

PoE Pass-through

With its built-in advanced 48V Power over Ethernet for one IPCAM or another AirMax 5X eases the deployment and reaches the green environment standard by less cabling and no extra power source needed.

Airlive3

Multiple Operation Modes

AirMax 5X can function as an AP, WDS Station, WDS + AP, Client infrastructure, WISP Router or AP Router.

Bandwidth Management

AirMax 5X provides the capabilities to control user’s bandwidth and can define varies classes of connection speed for different subscription, ensuring the data and video transmission smoothly.

Suitable applications: Business Campus, School Campus, Government Park, Port/Harbor, Commercial Building, Stadium, Business Hotel, Gas pipeline, Highway, Coastal defense area, Safe City, Road Monitoring, Public security, Substation, Nationwide prison, management system.

More Information: http://www.airlive.com/product/AirMax5X

The post AirMax 5X completed the Video Surveillance Network Solutions appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: AirMax 5X completed the Video Surveillance Network Solutions