Friday, August 12, 2022

BrianOHiggins

7 POSTS0 COMMENTS

Submissions for copyright law revision, un-intended consequences, and IT security

The Federal Government has just concluded its public consultation phaseregarding input for updating legislation for the copyright act.ITsecurity does not immediately spring to mind...

By way of example. . .

The HIPS tool the PAL team used provides an open interface so a custom rule to precisely shield the SipXtapi vulnerability could be built.

Putting a PAL to work

Voice over IP - VoIP - is inevitable in government. It is the hottest area, and many government departments are exploring how they can take advantage of its benefits - like greater flexibility in service and features and possibly lower costs. This rating is reserved for the most critical problems.

Putting a PAL to work

The software vulnerability life cycle starts with a newly discovered or published vulnerability and ends when machines are patched. In practice, however, all machines will never be patched, so vulnerabilities are tracked as a half-life, when for example half of vulnerable hosts are patched. According to Qualys, the current half-life for Internet-facing hosts is 19 days, down from 30 days a couple of years ago. However, we lose this race to the hackers as the average latency now is only six days from discovery to attacks. It is important to note that 80 per cent of attacks occur during the first half-life. So if you are a target - and government departments are - you had better be patched or shield for a known vulnerability right away.

By way of example…

The HIPS tool the PAL team used provides an open interface so a custom rule to precisely shield the SipXtapi vulnerability could be built.

Putting a PAL to work

Voice over IP

The VoIP tradeoff

IP telephony, better known as Voice over IP, or VoIP, is one of the most important emerging trends in telecom

Apps under attack

Security is just like quality

Tech News