{"id":11503,"date":"2011-03-20T06:58:09","date_gmt":"2011-03-19T20:58:09","guid":{"rendered":"http:\/\/power-up.space\/?p=11503"},"modified":"2011-03-20T06:58:09","modified_gmt":"2011-03-19T20:58:09","slug":"media-spokespeople-available-%e2%80%93-internet-security","status":"publish","type":"post","link":"https:\/\/www.impulsegamer.com\/wordpress\/?p=11503","title":{"rendered":"MEDIA SPOKESPEOPLE AVAILABLE \u2013 INTERNET SECURITY"},"content":{"rendered":"<p>Pure Hacking is Australia\u2019s leading dedicated, vendor-neutral ethical hacking company in Australia. Its sole focus is risk and security. Today it provides secure development services, secure code reviews, penetration testing and training modules to a range of clients throughout the Asia Pacific region.<\/p>\n<p>Members of the Pure Hacking team regularly present at international seminars, contribute to professional papers on internet security and are highly active in the industry organisations that investigate risk and security across technology platforms.<\/p>\n<p>Pure Hacking spokespeople are available for media commentary on the following internet security-related topics. Please note that these topics are very specific, however Pure Hacking is available for high level commentary on any security issue:<\/p>\n<ul>\n<li>Software and Infrastructure security<\/li>\n<li>Penetration Testing \u2013 addresses the security of corporate networks from an internal and external perspective<\/li>\n<li>Web Application Penetration testing \u2013 discovering ways to break into various web applications, such as internet banking sites<\/li>\n<li>Web Appliance Penetration Testing \u2013 evaluation of web application firewalls, web content\/ URL\/anti-malware\/anti-spyware filters<\/li>\n<li>Web Services Penetration Testing<\/li>\n<li>Mobile Web Application Penetration Testing<\/li>\n<li>How secure is code \u2013 identification of vulnerabilities in either web-based or software-based applications<\/li>\n<li>Web Application Security Architecture \u2013 identifying weak spots in design, layout and security zones. Review web servers in Configuration Reviews to identify weaknesses that can be hardened to increase the security of the web application.<\/li>\n<li>Binary Analysis \u2013 identify copy protection breaches and patent infringements<\/li>\n<li>Malware Analysis \u2013 identification of malicious executable code and determine the actions that it performs on a system<\/li>\n<li>Mobile Apps \u2013 identify the vulnerabilities and security weaknesses of mobile apps and devices<\/li>\n<li>Cloud computing and Virtualisation \u2013 identify attacks on an administrator workstation and manipulation of the virtual infrastructure software weaknesses<\/li>\n<li>Wireless Security vulnerabilities \u2013 identify a range of vulnerabilities including wireless LAN discovery, denial of service attack identification, signal leakage, encryption cracking and spoofing attacks etc.<\/li>\n<li>VoIP Security \u2013 addresses security vulnerabilities within the VoIP environment from phone configuration, call eavesdropping, VoIP denial of service, default server\/voicemail\/phone passwords etc<\/li>\n<li>Client-side Software attacks \u2013 this is where modern attacks are aimed at Internet Explorer, Adobe Reader, Microsoft Office. Phishing and external penetration tests reveal where compromises take place.<\/li>\n<li>Rogue employee attacks \u2013 how employees or attackers with access to the internal network escalate privileges to control the SCADA environment. This is usually from weak password guessing and password cracking, sensitive information disclosure, Windows enumeration etc<\/li>\n<li>Managed Virtual Web Application Firewalls\/Managed Cloud Web Application Firewall<\/li>\n<li>Digital forensics \u2013 how corporate networks are investigated, trends<\/li>\n<li>Security Policy and Guidelines Review &amp; Development issues in the Australian corporate sector<\/li>\n<li>Threat and Risk assessments \u2013 what to look for this year<\/li>\n<li>PCI Compliance<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Our Spokespeople:<\/strong><\/p>\n<p><strong>Robert McAdam, CEO<\/strong><\/p>\n<p>Robert McAdam began his security career in 1990 with the New South Wales Police Force.\u00a0<\/p>\n<p>After eight years of active service, he moved to IBM Global Services Australia where he held the roles of Program Manager, Sydney Olympics and Program Manager for Penetration Testing, Managed Firewalls and Intrusion Detection Systems across Asia Pacific in IBM\u2019s Security and Privacy Practice.<\/p>\n<p>In 2002, Mr McAdam started Pure Hacking, which today works with companies both large and small, predominantly in data intensive industries including finance, business services, communications, education and health.<\/p>\n<p><strong>Ty Miller, CTO<\/strong><\/p>\n<p>Ty Miller is the Chief Technology Officer at Pure Hacking, and leads their specialist security team and strategy to ensure that Pure Hacking is at the forefront of specialist information security services. Ty specialises in all forms of penetration testing and secure infrastructure design. He runs various security courses for Pure Hacking in both web application and infrastructure security, and performs independent security research.<\/p>\n<p>Ty has been in the IT security area for around ten years, is an experienced presenter at high profile security conferences and d is also a co-author of the book Hacking Exposed Linux.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pure Hacking is Australia\u2019s leading dedicated, vendor-neutral ethical hacking company in Australia. Its sole focus is risk and security. Today it provides secure development services, secure code reviews, penetration testing and training modules to a range of clients throughout the Asia Pacific region. Members of the Pure Hacking team regularly present at international seminars, contribute<\/p>\n<p class=\"more-link\"><a href=\"https:\/\/www.impulsegamer.com\/wordpress\/?p=11503\">Read More\u2026<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-11503","post","type-post","status-publish","format-standard","hentry","category-game-news"],"_links":{"self":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/11503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11503"}],"version-history":[{"count":1,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/11503\/revisions"}],"predecessor-version":[{"id":11504,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/11503\/revisions\/11504"}],"wp:attachment":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}