If you suddenly open a drawer in your kitchen at night, and see and kill a small cockroach, you would never go back to bed and sleep easy. You would now know you have a major problem.
That little guy was simply not as agile and stealthy as the other thousand that were hiding under the cutlery tray, and on the underside of the cabinet.
So David Cecil the ‘self-taught’ ‘ego driven’ hacker from Cowra was not agile and certainly not stealthy, his internet bragging got him caught.
State sponsored actors and those driven by money are highly skilled and don’t brag online. They do their work quietly and undetected. This notoriety thing is passé and over-rated.
The excitement of this arrest is misplaced, it should simply serve to alert Platform Networks, and any other potential targets that they have a major problem.
It is easy to get in and hard to be found.
If we had the ability to simply look under the tray and underside of the cabinet how many stealthier, more focused roaches would we find in our systems?
Perhaps we know the real truth and simply want to go back to bed and not confront it.
Protection with detection and response will help.
Why nation-state attacks are everyone’s problem
Hear from Invictus Games Sydney 2019 CEO, Patrick Kidd OBE and Head of Technology, @James-d-smith -share their insights on how they partnered with Unisys to protect critical data over an open, public WiFi solution.
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
An interview with CSO's David Braue and Ian Yip, Chief Technology Officer, McAffee.
According to new research conducted by the Ponemon Institute, Australia and New Zealand have the highest levels of data breaches out of the nine countries investigated. This was linked to heavy investment in security detection and an under-investment in security and vulnerability response capabilities