Application security

November 2012 Information Security

Despite an array of security tools at their disposal, companies are still under cyber attack and, if one looks at the number of known successful attacks on business data and finances, it seems that the criminals are winning. Of course, in South Africa most of these breaches are not publicised because there is no requirement on the part of the company to acknowledge successful intrusions. This may change in the near future, but the reality is that publicising attacks is not the solution.

Some say that the embarrassment factor once a breach is public will force companies to tighten their digital perimeters as a risk mitigation measure. But then, what do they do about the internal threats from employees who see a vulnerability and decide to ‘borrow’ some company money to fund their weekend trip to the casino or support their neighbourhood syndicate? Most people in the know will tell you that the prevalence of internal fraud is far higher than external attacks.

The latest South African Cyber Threat Barometer for 2012/13 estimates that R2,65 billion was lost to cyber crime in the period from January 2011 to August 2012, with just over R660 million that was not recovered. To download the barometer for free, please go to www.securitysa.com/*cyberthreat-za (this is a shortened link that will take you to http://www.wolfpackrisk.com/wp-content/uploads/2012/10/SA%202012%20Cyber%20Threat%20Barometer_Hi_res.pdf).

At the recent CA Symposium in Johannesburg, Hi-Tech Security Solutions spoke to Ed Medcalf, regional commercial manager, CA Technologies, about the latest in application security.

Ed Medcalf
Ed Medcalf

While we all enjoy the technology available today that allows us to access the corporate network and applications from anywhere, using almost any device, the convenience is offset by a reduction in security because the perimeter of the business is now everywhere. If, for example, you log into an application while at the airport and someone watches you type in your password, if that password is your only defence, the watcher can now access whatever you can. Similarly, if you have malware on your mobile device courtesy of a funky app you downloaded, your personal details as well as your access credentials to corporate digital assets are also compromised.

Instead of monitoring data streams and stored data for known malware strings, as most antivirus applications do, Medcalf suggests it is time to monitor the context of application access rather than only the data. Add to this the context of the user’s behaviour and the business has a good chance of stopping both internal and external shenanigans.

It is important to remember that a valid user will not need malware to access corporate systems as they are allowed, or even supposed to be there. However, if you know the user’s normal behaviour, such as what applications he uses, what authority he has and where he accesses the system from, you can adjust the security protocols to grant access while remaining secure.

Medcalf gives the example of a CFO accessing sensitive data. If the CFO is authenticated and logs on from his office PC, continues with his normal behaviour at the times he usually does his work, he can be granted access transparently. If however, he logs in at midnight from an unknown device, the system can automatically insist on more security to ensure the access is legitimate, or even deny access because it is too risky.

If you are already monitoring the data going through applications, this added layer of security will not add any latency or slow the user at all. Medcalf adds that CA works with customers to set policies to implement this type of application security, looking at variables that make sense to the company, such as the number of times a user requests access, the value of transactions he normally handles, and whether he crosses boundaries like financial ceilings and so forth.

Naturally, application security based on behaviour is only one tool in the arsenal of protection companies need to take to secure their digital assets and bank accounts from internal and external threats.

The security process starts with authenticating users and making sure they have access to what they need to do their jobs. It also includes taking the time to create workable policies that set behavioural limits, such as how much money an individual can authorise for payment and who needs to verify the final payment etc.

It also means controlling access via mobile devices. If the CEO above accesses the network via his Galaxy Tablet and the company knows this device is his and has the relevant security installed, access is granted. If however, it is an unknown device, access can be denied or limited.

In the good old days, digital security was an application you could install and basically forget. Today it has become a craft that requires cooperation across different disciplines within the company, focused on developing a constantly evolving solution.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.