Australian authorities are investigating an attempt to hack into the national parliament’s computer network, two senior lawmakers said on Friday, but there was no evidence yet that any data had been accessed or stolen.
https://twitter.com/petrovdempski/status/1094427413642207232
Experts Comments below:
Dr Darren Williams, CEO and Founder at BlackFog:
“Hackers have become increasingly sophisticated and are attacking organisations from all directions. History tells us that cyber criminals will always find a way of getting in so attackers must be stopped from removing or leaking confidential and classified data, before it causes untold damage and potentially brings a company – or in this case a government – down.”
Ilia Kolochenko, CEO at High-Tech Bridge:
Moreover, even if some elements will nonetheless permit to charge with the attack one of the alleged suspects, the legal avenues for a viable remedy will very limited and economically futile.
Perhaps, the budget allocated for the forensics is better spent on network hardening and enhancement of continuous security monitoring to prevent such incidents in the future.”
Alvin Rodrigues, Security Strategist, APAC and Sam Ghebranious, Senior Regional Director, ANZ at Forcepoint:
“Internationally, we’re seeing governments and enterprises alike faced with increasingly sophisticated cyber attacks on their infrastructure. We’re learning that traditional security approaches for combatting cybercrimes are no longer effective. To better protect state secrets and intellectual property, nation-state and enterprises need to understand who is internally accessing critical data and why. Organisations (including government) should focus on understanding the normal behaviour of legitimate users, online and offline, who have access to trade secrets. By understanding a normal baseline behaviour, it becomes easier to know when this behaviour changes – signalling a range of behaviours from corporate non-compliance, an attempted breach or a compromised insider.”
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.