A security breach has been detected at Telstra’s Asian telecommunications provider, Pacnet data centre. The breach occurred prior to Telstra taking ownership of Pacnet, and Telstra was made aware of it on the finalization of the purchase on April 16 this year.
Telstra had taken immediate action to protect the security of the network once it was informed of the breach.
Comments from Tim Erlin, director of IT security and risk strategy at Tripwire
“Telstra isn’t the first organization to learn about past issues at a company they’ve acquired. A prior breach is just one more business risk among many in an acquisition, but the more we understand about these incidents, the better businesses can manage that risk. Information sharing isn’t just about better security; it’s about better business.
If you’re part of an acquiring company, information security needs to be part of the due diligence process. We’ve all seen the statistics about the number of breaches growing, and it follows logically that more and more acquired companies will have experienced one. This a reality the business world needs to manage more effectively.”
BIO : Tim Erlin is a Director of Product Management at Tripwire, and is responsible for the Suite360 product line including Vulnerability Management, Configuration Auditing, and Policy Compliance. Previously, in his nearly 10 year tenure at nCircle, he has also held the positions of Senior Sales Engineer and QA Engineer. Tim’s career in information technology began with project management, customer service, as well as systems and network administration. Tim is a member of ISSA, and frequently hosts corporate webinars on various topics, including regulatory compliance.
About Tripwire
Tripwire, Inc., a global provider of risk-based security and compliance management solutions, today announced Tripwire® Enterprise™ version 8.3 featuring a new, stand-alone Policy Manager™. Tripwire Policy Manager provides the detailed visibility into system configurations critical to minimizing security risks and ensuring compliance.
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.