Application security

November 2012 Information Security

Despite an array of security tools at their disposal, companies are still under cyber attack and, if one looks at the number of known successful attacks on business data and finances, it seems that the criminals are winning. Of course, in South Africa most of these breaches are not publicised because there is no requirement on the part of the company to acknowledge successful intrusions. This may change in the near future, but the reality is that publicising attacks is not the solution.

Some say that the embarrassment factor once a breach is public will force companies to tighten their digital perimeters as a risk mitigation measure. But then, what do they do about the internal threats from employees who see a vulnerability and decide to ‘borrow’ some company money to fund their weekend trip to the casino or support their neighbourhood syndicate? Most people in the know will tell you that the prevalence of internal fraud is far higher than external attacks.

The latest South African Cyber Threat Barometer for 2012/13 estimates that R2,65 billion was lost to cyber crime in the period from January 2011 to August 2012, with just over R660 million that was not recovered. To download the barometer for free, please go to www.securitysa.com/*cyberthreat-za (this is a shortened link that will take you to http://www.wolfpackrisk.com/wp-content/uploads/2012/10/SA%202012%20Cyber%20Threat%20Barometer_Hi_res.pdf).

At the recent CA Symposium in Johannesburg, Hi-Tech Security Solutions spoke to Ed Medcalf, regional commercial manager, CA Technologies, about the latest in application security.

Ed Medcalf
Ed Medcalf

While we all enjoy the technology available today that allows us to access the corporate network and applications from anywhere, using almost any device, the convenience is offset by a reduction in security because the perimeter of the business is now everywhere. If, for example, you log into an application while at the airport and someone watches you type in your password, if that password is your only defence, the watcher can now access whatever you can. Similarly, if you have malware on your mobile device courtesy of a funky app you downloaded, your personal details as well as your access credentials to corporate digital assets are also compromised.

Instead of monitoring data streams and stored data for known malware strings, as most antivirus applications do, Medcalf suggests it is time to monitor the context of application access rather than only the data. Add to this the context of the user’s behaviour and the business has a good chance of stopping both internal and external shenanigans.

It is important to remember that a valid user will not need malware to access corporate systems as they are allowed, or even supposed to be there. However, if you know the user’s normal behaviour, such as what applications he uses, what authority he has and where he accesses the system from, you can adjust the security protocols to grant access while remaining secure.

Medcalf gives the example of a CFO accessing sensitive data. If the CFO is authenticated and logs on from his office PC, continues with his normal behaviour at the times he usually does his work, he can be granted access transparently. If however, he logs in at midnight from an unknown device, the system can automatically insist on more security to ensure the access is legitimate, or even deny access because it is too risky.

If you are already monitoring the data going through applications, this added layer of security will not add any latency or slow the user at all. Medcalf adds that CA works with customers to set policies to implement this type of application security, looking at variables that make sense to the company, such as the number of times a user requests access, the value of transactions he normally handles, and whether he crosses boundaries like financial ceilings and so forth.

Naturally, application security based on behaviour is only one tool in the arsenal of protection companies need to take to secure their digital assets and bank accounts from internal and external threats.

The security process starts with authenticating users and making sure they have access to what they need to do their jobs. It also includes taking the time to create workable policies that set behavioural limits, such as how much money an individual can authorise for payment and who needs to verify the final payment etc.

It also means controlling access via mobile devices. If the CEO above accesses the network via his Galaxy Tablet and the company knows this device is his and has the relevant security installed, access is granted. If however, it is an unknown device, access can be denied or limited.

In the good old days, digital security was an application you could install and basically forget. Today it has become a craft that requires cooperation across different disciplines within the company, focused on developing a constantly evolving solution.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
From the editor's desk: Can it be October already?
Technews Publishing News & Events
Welcome to the final SMART Handbook of the year. In this issue, we focus on residential estate security, from the fence to the gate and beyond. We also review our Durban SMART Estate Security Conference, ...

Read more...
Private fire services becoming the norm?
Technews Publishing SMART Security Solutions Editor's Choice
As the infrastructure and service delivery in many of South Africa’s major cities decline, with a few, limited exceptions, more of the work that should be done by the state has fallen to private companies.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
Visitor management views
Entry Pro ATG Digital Technews Publishing SMART Security Solutions Access Control & Identity Management Residential Estate (Industry)
Visitor management is always changing, taking technology and legislation into account. SMART Security Solutions examines the latest trends with input from ATG Digital and Entry Pro.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.