Application security

November 2012 Information Security

Despite an array of security tools at their disposal, companies are still under cyber attack and, if one looks at the number of known successful attacks on business data and finances, it seems that the criminals are winning. Of course, in South Africa most of these breaches are not publicised because there is no requirement on the part of the company to acknowledge successful intrusions. This may change in the near future, but the reality is that publicising attacks is not the solution.

Some say that the embarrassment factor once a breach is public will force companies to tighten their digital perimeters as a risk mitigation measure. But then, what do they do about the internal threats from employees who see a vulnerability and decide to ‘borrow’ some company money to fund their weekend trip to the casino or support their neighbourhood syndicate? Most people in the know will tell you that the prevalence of internal fraud is far higher than external attacks.

The latest South African Cyber Threat Barometer for 2012/13 estimates that R2,65 billion was lost to cyber crime in the period from January 2011 to August 2012, with just over R660 million that was not recovered. To download the barometer for free, please go to www.securitysa.com/*cyberthreat-za (this is a shortened link that will take you to http://www.wolfpackrisk.com/wp-content/uploads/2012/10/SA%202012%20Cyber%20Threat%20Barometer_Hi_res.pdf).

At the recent CA Symposium in Johannesburg, Hi-Tech Security Solutions spoke to Ed Medcalf, regional commercial manager, CA Technologies, about the latest in application security.

Ed Medcalf
Ed Medcalf

While we all enjoy the technology available today that allows us to access the corporate network and applications from anywhere, using almost any device, the convenience is offset by a reduction in security because the perimeter of the business is now everywhere. If, for example, you log into an application while at the airport and someone watches you type in your password, if that password is your only defence, the watcher can now access whatever you can. Similarly, if you have malware on your mobile device courtesy of a funky app you downloaded, your personal details as well as your access credentials to corporate digital assets are also compromised.

Instead of monitoring data streams and stored data for known malware strings, as most antivirus applications do, Medcalf suggests it is time to monitor the context of application access rather than only the data. Add to this the context of the user’s behaviour and the business has a good chance of stopping both internal and external shenanigans.

It is important to remember that a valid user will not need malware to access corporate systems as they are allowed, or even supposed to be there. However, if you know the user’s normal behaviour, such as what applications he uses, what authority he has and where he accesses the system from, you can adjust the security protocols to grant access while remaining secure.

Medcalf gives the example of a CFO accessing sensitive data. If the CFO is authenticated and logs on from his office PC, continues with his normal behaviour at the times he usually does his work, he can be granted access transparently. If however, he logs in at midnight from an unknown device, the system can automatically insist on more security to ensure the access is legitimate, or even deny access because it is too risky.

If you are already monitoring the data going through applications, this added layer of security will not add any latency or slow the user at all. Medcalf adds that CA works with customers to set policies to implement this type of application security, looking at variables that make sense to the company, such as the number of times a user requests access, the value of transactions he normally handles, and whether he crosses boundaries like financial ceilings and so forth.

Naturally, application security based on behaviour is only one tool in the arsenal of protection companies need to take to secure their digital assets and bank accounts from internal and external threats.

The security process starts with authenticating users and making sure they have access to what they need to do their jobs. It also includes taking the time to create workable policies that set behavioural limits, such as how much money an individual can authorise for payment and who needs to verify the final payment etc.

It also means controlling access via mobile devices. If the CEO above accesses the network via his Galaxy Tablet and the company knows this device is his and has the relevant security installed, access is granted. If however, it is an unknown device, access can be denied or limited.

In the good old days, digital security was an application you could install and basically forget. Today it has become a craft that requires cooperation across different disciplines within the company, focused on developing a constantly evolving solution.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
Directory of suppliers
Technews Publishing SMART Security Solutions Fire & Safety
The Directory of Product and Solution Suppliers for the fire safety industry includes details of companies that provide security and risk mitigation products, advice, and services within this market.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
From the editor's desk: Regulations, standards and skills, but poor enforcement
Technews Publishing SMART Security Solutions Fire & Safety
South Africa depends on the carrot approach to fire safety; in other words, businesses choosing to do the right thing, as the stick (or enforcement of regulations) is unfortunately lacking.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
] A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.