Adriana Angeleska – Sense of Security Thu, 05 Mar 2020 00:23:21 +0000 en-US hourly 1 https://wordpress.org/?v=5.4 Cyber Security for Smart Grids /cyber-security-for-smart-grids/ /cyber-security-for-smart-grids/#respond Thu, 05 Mar 2020 00:22:27 +0000 /?p=6950 While the Microsoft ecosystem has enjoyed dramatic improvements in security and the latest Windows 10 is orders of magnitude more secure than previous generations of the workstation platform, we make the case for advanced security testing to ensure you avoid calamity.

The post Cyber Security for Smart Grids appeared first on Sense of Security.

]]>

Cyber Security for Smart Grid

Integrated IT and OT systems like Smart Grids are becoming more popular because of their self-management abilities, ensuring continuous availability of power. The ease of operation is pulling more energy and utility companies to invest in these systems.

But along with the benefits, critical systems are becoming a prime target for cyber attackers to inflict serious damage and disruption.

Cybersecurity is all the more critical while implementing such systems compared to the traditional electrical grid.

Download the full whitepaper to understand the emerging cyber-attack  scenarios in relation to the smart grid, its vulnerabilities and standards for cybersecurity assessment.

Get the full document here

[contact-form-7]

If you need assistance with fully understanding this report or would like to chat further about your security needs, our specialists consultants are here to help you. Please contact us today.

The post Cyber Security for Smart Grids appeared first on Sense of Security.

]]>
/cyber-security-for-smart-grids/feed/ 0
Presentation: RSA USA 2020 – Preventing an Enterprise Win10 Rollout Being Remotely Controlled and Ransomed /presentation-rsa-usa-2020-preventing-an-enterprise-win10-rollout-being-remotely-controlled-and-ransomed/ /presentation-rsa-usa-2020-preventing-an-enterprise-win10-rollout-being-remotely-controlled-and-ransomed/#respond Thu, 27 Feb 2020 22:52:42 +0000 /?p=6939 ...we call these Dynamic Risk Assessments (DRA). This type of assessment is based on the premise that we are not stifled by prescriptive rules, a spreadsheet listing the methods we must use, or having meetings with any number of stakeholders who may not disclose the true state of affairs for fear of losing credibility or possibly their job.

The post Presentation: RSA USA 2020 – Preventing an Enterprise Win10 Rollout Being Remotely Controlled and Ransomed appeared first on Sense of Security.

]]>
Our COO Murray Goldschmidt, a top RSA speaker held a presentation at RSA USA 2020 on the topic of Preventing an Enterprise Win10 Rollout Being Remotely Controlled and Ransomed

Windows 10 is the platform of choice for large scale, corporate controlled, end user OS deployments. Referred to through many names incl Enterprise Roll-Outs, Standard Operating Environments (SOE), Golden Image deployment etc they all relate to the same thing. A standardized deployment that needs to be secured at creation and then managed for the lifetime in operation. Large corps & govt tend to use the same formula. Create an image. Add in some enterprise mgmt features, end point security & full disk encryption. Harden. Test it (maybe). Operate it in the field. Deal with any fall out. These are high cost, time sensitive, task management centric projects. Using an outsourced partner to design, implement & manage the process adds in an element of supply chain risk – making the entire solution susceptible to long term time-in-market attacks. This includes a timeless opportunity for total environment-take-over. It is our experience that organisations are short-changing themselves by doing very limited testing of the system prior to deployment. At best this is limited to a hardening review.

This presentation describes a case-study for why testing is required to address a stream of risks and how this saved a large corporate from deploying an image that was certain to result in 10,000+ machines being remotely controlled by an adversary.

To learn more download our presentation here. For more information call us on 1300 922 933.

The post Presentation: RSA USA 2020 – Preventing an Enterprise Win10 Rollout Being Remotely Controlled and Ransomed appeared first on Sense of Security.

]]>
/presentation-rsa-usa-2020-preventing-an-enterprise-win10-rollout-being-remotely-controlled-and-ransomed/feed/ 0
Presentation: RSA USA 2020 – What Was Once Old Is New Again: Domain Squatting in 2020 /presentation-rsa-usa-2020-what-was-once-old-is-new-again-domain-squatting-in-2020/ /presentation-rsa-usa-2020-what-was-once-old-is-new-again-domain-squatting-in-2020/#respond Thu, 27 Feb 2020 17:00:10 +0000 /?p=6938 Despite investment in DDoS mitigation, testing solutions is seldom on the agenda of most vulnerability management programs that focus on vulnerability scanning and pen testing. This presentation delivers an effective approach to validate your defenses against all forms of DDoS including the ability to simulate attacks, measure your response and determine if your operational practices are working.

The post Presentation: RSA USA 2020 – What Was Once Old Is New Again: Domain Squatting in 2020 appeared first on Sense of Security.

]]>
Our Practice Manager Jeremy du Bruyn and our Head of Research Willem Mouton held a presentation at RSA USA 2020 on the topic of What Was Once Old Is New Again: Domain Squatting in 2020

A common cyber-attack technique is to lure a victim to browse to an attacker controlled website that is hosting malware or the like. One way to lure a victim is to register a DNS domain that resembles that of a major brand, and then either entice the victim to visit the website, for instance via an email message, or to simply wait for the victim to mistype or misspell the major brand’s website address. This registering of a similar DNS domain is commonly referred to as domain squatting. People are encouraged to be suspicious of emails received from unknown senders, but what happens when an email appears to come from a known person or organization, and the emails and its attachments are in line with the expected content. Again, research into similar topics isn’t new. However, by utilizing domain squatting the registering of DNS domains can be extracted by examining email flows, and the email content categorized by applying topic modelling on their contents. This allows for specifically crafted spear-phishing emails that match both the expected email sender and the topics of correspondence, which drastically increases the chances of a successful phish.

In this session, it will be demonstrated how old school domain squatting can be modernized to include OSINT gathering and the delivery of weaponized documents using email messages. The result is scarily accurate corporate relationship and supply chain mappings, as well as re-purposing actual business documents into spear-phishing attacks.

To learn more download our presentation here. For more information call us on 1300 922 933.

The post Presentation: RSA USA 2020 – What Was Once Old Is New Again: Domain Squatting in 2020 appeared first on Sense of Security.

]]>
/presentation-rsa-usa-2020-what-was-once-old-is-new-again-domain-squatting-in-2020/feed/ 0
Three Sense of Security team members will be presenting at RSA USA 2020 /three-sense-of-security-team-members-presenting-at-rsa-usa-2020/ /three-sense-of-security-team-members-presenting-at-rsa-usa-2020/#respond Tue, 25 Feb 2020 22:18:26 +0000 /?p=6903 We are pleased to announce that three of our Sense of Security team members will be presenting at the RSA USA 2020 conference. Our Practice Manager Jeremy du Bruyn and...

The post Three Sense of Security team members will be presenting at RSA USA 2020 appeared first on Sense of Security.

]]>
We are pleased to announce that three of our Sense of Security team members will be presenting at the RSA USA 2020 conference.

Our Practice Manager Jeremy du Bruyn and our Head of Research Willem Mouton will be jointly presenting What Was Once Old Is New Again: Domain Squatting in 2020.  In this session the presenters will demonstrate how old school domain squatting can be modernized to include OSINT gathering and the delivery of weaponized documents using email messages. The result is scarily accurate corporate relationship and supply chain mappings, as well as re-purposing actual business documents into spear-phishing attacks.

Also, our COO Murray Goldschmidt, who is ranked as a top speaker at RSA this year, will be presenting on  Preventing an Enterprise Win10 Rollout Being Remotely Controlled and Ransomed. A case-study for static and dynamic testing of Win10 enterprise rollout images. How this saved an organization from deploying an image that would have resulted in 10,000+ machines being remotely controlled by an adversary for ransom. Hardening reviews, configuration management, app whitelisting effectiveness, encryption recovery, and the ability to detect and defeat sleeper malware are described.

Jeremy and Willem’s presentation will be held on Thursday, February 27, 2020 from 8:00 am –8:50 am in Moscone West 3004. Murray’s presentation will be held on Thursday, February 27, 2020 from 2:50 pm –3:40 pm in Moscone West 2006.

For more information and to secure your spot for Jeremy and Willem’s presentation visit https://www.rsaconference.com/experts/jeremy-du-bruyn#upcomingsessions or for Murray’s presentation visit https://www.rsaconference.com/experts/murray-goldschmidt#upcomingsessions.

You don’t want to miss out

See you in San Francisco!!

The post Three Sense of Security team members will be presenting at RSA USA 2020 appeared first on Sense of Security.

]]>
/three-sense-of-security-team-members-presenting-at-rsa-usa-2020/feed/ 0
Security Awareness Training Program for Whole-of-Business /security-awareness-training-program-for-whole-of-business/ /security-awareness-training-program-for-whole-of-business/#respond Wed, 11 Dec 2019 05:53:14 +0000 /?p=6750 Careless or uninformed staff are the second most likely cause of a serious security breach, second only to malware. Security awareness training is the first step to solving this problem.

The post Security Awareness Training Program for Whole-of-Business appeared first on Sense of Security.

]]>

Careless or uninformed staff are the second most likely cause of a serious security breach, second only to malware.

The current security threat landscape is rapidly changing. The threats you faced yesterday will not be the threats you face tomorrow. Today’s attackers are typically highly trained, financially motivated and possibly in the employ of nation states.

A whole-of-business approach to security awareness training is needed encompassing everyone.

Attackers are systematically adapting techniques to target the weakest elements in your business. Their attacks are wide and also targeted, with motivated attackers carefully perfecting their craft to get handsome returns on their investment in time.

People remain the weak link in the security of networks, applications and data. It is not only the rank-and-file employees who succumb to phishing scams who pose risks. Most businesses believe that the shiny new technologies they’ve acquired will protect them from everything while producing the reporting they need to comply with standards and regulations. However, human points of interaction have the potential to undermine even the most comprehensively designed systems through a simple mouse click.

Get the full document here

[contact-form-7]

If you need assistance with fully understanding this report or would like to chat further about your security needs, our specialists consultants are here to help you. Please contact us today.

The post Security Awareness Training Program for Whole-of-Business appeared first on Sense of Security.

]]>
/security-awareness-training-program-for-whole-of-business/feed/ 0
Red Teaming: A technical risk assessment conducted live and real-time. /red-teaming-a-technical-risk-assessment/ /red-teaming-a-technical-risk-assessment/#respond Fri, 06 Dec 2019 05:37:39 +0000 https://pingpongpang.senseofsecurity.com/?p=6704 Get a better understanding of Red Teaming and learn more about what attackers might be most interested in gaining access to in your organisation.

The post Red Teaming: A technical risk assessment conducted live and real-time. appeared first on Sense of Security.

]]>

Red Teaming involves a comprehensive replication of the behaviour of a real cybercriminal. This simulation is conducted via a multilayer approach to security testing that not only exploits vulnerabilities in technology, but also exploits the flaws in people and processes within the organisation and its supply chain.

“Red Teaming” originates from a military terminology with the Red Team being the attackers and the Blue Team being the defenders. This approach simulates more closely how unconstrained real-world attacks take place from key threat actors such as state-sponsored attackers, terrorists, organised crime gangs, corporate spies and other nefarious individuals. Your organisation and any outsourced IT services should be operating as the Blue Team – ideally defeating the attack as it occurs.

The results of such a test will allow you to create an independent, neutral view of the effectiveness of both security controls and the team responsible for

Download the below datasheet and case study to get a better understanding of Red Teaming.

[contact-form-7]

If you have any questions or would like to discuss your security training needs contact us today or call 1300 922 923.

The post Red Teaming: A technical risk assessment conducted live and real-time. appeared first on Sense of Security.

]]>
/red-teaming-a-technical-risk-assessment/feed/ 0
Distributed Denial of Service testing services /distributed-denial-of-service-testing-services/ /distributed-denial-of-service-testing-services/#respond Fri, 06 Dec 2019 05:03:36 +0000 https://pingpongpang.senseofsecurity.com/?p=6700 DDoS is now considered one of the primary threat types facing every industry and business that is exposed to the Internet. Our Data Sheet will give a better understanding of how it affects you.

The post Distributed Denial of Service testing services appeared first on Sense of Security.

]]>

In recent times, Distributed Denial of Service (DDoS) attacks have continued to gain media attention. High profile organisations are coming under attack,
globally, regionally and locally, across the spectrum of Government, large corporates and any entity being hosted on cloud platforms.

Denial of Service attacks have evolved from singlesource (e.g. sending overwhelming volumes of email), which are relatively easily detected and
defeated, to attacks that come from many thousands of compromised agents (bots) acting on behalf of threat actors.

DDoS is now considered one of the primary threat types facing every industry and business that is exposed to the public Internet.

Download the below datasheet and case study to get a better understanding Distributed Denial of Service.

[contact-form-7]

If you have any questions or would like to discuss your security training needs contact us today or call 1300 922 923.

The post Distributed Denial of Service testing services appeared first on Sense of Security.

]]>
/distributed-denial-of-service-testing-services/feed/ 0
Presentation: RMIA National Conference – The Business Case for Dynamic Risk Assessments /rmia-national-conference-key-note-presentation-the-business-case-for-dynamic-risk-assessments/ /rmia-national-conference-key-note-presentation-the-business-case-for-dynamic-risk-assessments/#respond Wed, 13 Nov 2019 05:51:56 +0000 https://pingpongpang.senseofsecurity.com/?p=6559 ...we call these Dynamic Risk Assessments (DRA). This type of assessment is based on the premise that we are not stifled by prescriptive rules, a spreadsheet listing the methods we must use, or having meetings with any number of stakeholders who may not disclose the true state of affairs for fear of losing credibility or possibly their job.

The post Presentation: RMIA National Conference – The Business Case for Dynamic Risk Assessments appeared first on Sense of Security.

]]>
Our COO Murray Goldschmidt held a key note presentation on the topic of Dynamic Risk Assessments at the RMIA conference.

Risk Management is a discipline with an extensive heritage. Moving forward we need to adopt assessment methods that are going to give a higher degree of assurance that we are identifying realistic vectors through which the business may be subjected to attack. At Sense of Security (SOS) we call these Dynamic Risk Assessments (DRA). This type of assessment is based on the premise that we are not stifled by prescriptive rules, a spreadsheet listing the methods we must use, or having meetings with any number of stakeholders who may not disclose the true state of affairs for fear of losing credibility or possibly their job.

To learn more download our The Business Case for Dynamic Risk Assessments here. For more information call us on 1300 922 933.

The post Presentation: RMIA National Conference – The Business Case for Dynamic Risk Assessments appeared first on Sense of Security.

]]>
/rmia-national-conference-key-note-presentation-the-business-case-for-dynamic-risk-assessments/feed/ 0
Presentation: A snapshot into current Web Application vulnerabilities – Lunch N Learn /a-snapshot-into-current-web-application-vulnerabilities-lunch-n-learn-presentation/ /a-snapshot-into-current-web-application-vulnerabilities-lunch-n-learn-presentation/#respond Thu, 12 Sep 2019 00:01:57 +0000 https://pingpongpang.senseofsecurity.com/?p=6656 Our Chief Data Wrangler Willem Mouton presented at our Lunch N Learn event the findings of our Web Application report, provided some insight and risk context as to how your organisation compared to others in the market, what the top issues are, and why web application security still needs to be a core focus of security initiatives.  

The post Presentation: A snapshot into current Web Application vulnerabilities – Lunch N Learn appeared first on Sense of Security.

]]>
During 2018 Sense of Security (SOS) issued 175 web application penetration test reports. Each of those reports contained the assessment of either a single or multiple web applications. SOS has released this data to help improve security awareness of the state of web application security in Australia.

Our Chief Data Wrangler Willem Mouton presented at our Lunch N Learn event the findings of our State of Web Application Security in Australia report, provided some insight and risk context as to how your organisation compared to others in the market, what the top issues are, and why web application security still needs to be a core focus of security initiatives.

To learn more, download our A snap shot into current Web Application Vulnerabilities Lunch N Learn presentation slides. For more information call us on 1300 922 933.

The post Presentation: A snapshot into current Web Application vulnerabilities – Lunch N Learn appeared first on Sense of Security.

]]>
/a-snapshot-into-current-web-application-vulnerabilities-lunch-n-learn-presentation/feed/ 0
Presentation: Meet the Chiefs industry briefings – Cyber Resilience: Understanding Supply Chain Risks /meet-the-chiefs-industry-briefings-cyber-resilience-understanding-supply-chain-risks/ /meet-the-chiefs-industry-briefings-cyber-resilience-understanding-supply-chain-risks/#respond Thu, 18 Jul 2019 00:16:10 +0000 https://pingpongpang.senseofsecurity.com/?p=6657 Our COO Murray Goldschmidt was invited to present at the Meet the Chiefs industry briefings: Defence Watch Cyber Security event. He presented on the topic of Cyber Resilience - Understanding Supply Chain Risks. The main points addressed were: Exploring Supply Chain Attack Vectors, Understanding your Customer Requirements and Improving Cyber Resilience

The post Presentation: Meet the Chiefs industry briefings – Cyber Resilience: Understanding Supply Chain Risks appeared first on Sense of Security.

]]>
Our COO Murray Goldschmidt was invited to present at the Meet the Chiefs industry briefings: Defence Watch Cyber Security event.

He presented on the topic of Cyber Resilience – Understanding Supply Chain Risks.

The main points addressed were:

  • Exploring Supply Chain Attack Vectors
  • Understanding your Customer Requirements
  • Improving Cyber Resilience

To learn more, download our Cyber Resilience: Understanding Supply Chain Risks presentation here. For more information call us on 1300 922 933.

The post Presentation: Meet the Chiefs industry briefings – Cyber Resilience: Understanding Supply Chain Risks appeared first on Sense of Security.

]]>
/meet-the-chiefs-industry-briefings-cyber-resilience-understanding-supply-chain-risks/feed/ 0