SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
AlumniNews ISSUE 131
FEBRUARY 2014
■TheBigIssue/Fighting the cyber hackers
THE WORDS ‘CYBER SECURITY’
MAY have a futuristic ring to them,
but they represent an issue that
has the potential to affect all of us
at home or on the move and at the
companies we work for – even
governments are defending their
borders on a new online front.
For John McAdam
SEP27(1990), President and CEO
of application delivery firm F5
Networks, the persistent and
constant innovation of the hackers,
phishers and online ne’er-do-wells
has helped turn F5 Networks from
a relatively small IT organisation
with a $109m turnover when he
joined in the burst-bubble phase of
the dotcom boom to a business
turning over well in excess of $1bn.
And, while much of this may be
attributable to his business
prowess, he attributes recent
growth – at least in part – to our
love of all things mobile.
“I have never seen such fast
change as I’ve seen in the past
couple of years,” he says. “Mobility
has changed everything and is a
real driver for our business.” And
while that’s good news for
businesses such as F5 Networks, it
means that more of our intellectual
property, personal, customer and
company data is at risk.
John defines cyber security in
the big sense as securing the
stability and integrity of the internet
and the “whole online
environment”. Things have moved
on from the rather amateurish
‘phishing’ attacks, where hackers
would put up bogus web shop-
fronts of banks or emails
requesting personal data. Now
there are legion and far more
coordinated forms of attack
featuring techniques like ‘denial of
service’ where servers are made to
flood a website with data,
effectively knocking it out.
“This is where you get an
organising, informal group of
people who want to disrupt a
business for whatever reason,” he
says. “Then there are attacks on
governments, and there are
examples of blackmail attacks,
where people from across the
It’s a digital jungle out there, and any company that gets
complacent about its cyber security is likely to pay a
heavy price. Alumnus John McAdam’s company F5
Networks has become a business with a $1bn+
turnover by making applications fast, available and also
secure, helping firms stay one step ahead of the
hackers. He talks to PHIL HEARD
■TheBigIssue/Fighting the cyber hackers
world have got together and said
‘unless you meet our demands we
will bring your site down’.”
The advent of mobile internet
access combined with the ‘big
data’ phenomenon that sees
companies tracking and storing
information on customer behaviour
has multiplied the risks. “Big data
complicates things. The ability to
analyse vast data sets and draw
meaningful conclusions from them
means businesses know more
about customers than ever before,
especially in the online and retail
spaces,” says John.
The ethical balancing act
between privacy and security is
one for clients to mull over. Cyber
security gatekeepers are too busy
tackling the growth in mobility and
the constant proliferation of apps,
which are the most valuable target
for hackers. “Making apps secure
is a major challenge,” says John.
For many of us, internet security
may not extend beyond making
sure that our virus software is up to
date. But, as with flu jabs, these
updates tend to be made from out-
of-date material – or ‘signatures’ as
they’re known. And relying solely
on them is not enough. “A lot of
security is built on signatures, and
you need to make sure that they’re
all up to date, but the way you get
ahead is by using ‘policies’ – layers
of them,” says John.
These are the permissions that
grant access for certain users to
certain parts of a network or
specific applications. Similarly,
should an employee leave with a
personal mobile phone, for
example, company-specific data
can be identified and removed,
leaving their personal data intact.
“You may encounter a policy as
soon as you connect to a data
centre whether you’re on office
premises on a computer, or
connecting in from an internet café
on a mobile or a tablet,” says John.
“Your device, where you are and
other factors determine what you
can access.”
He advocates strongly the notion
of application ‘firewalls’, which
provide security and more policies
at an application level. Every
company will have a firewall to
protect their servers, but having a
walled garden filled with otherwise
“It’s a game that keeps on
going. You can never sit back
and think you’re secure
because the bad guys will think
of something”
JOHN McADAM SEP27(1990)
■TheBigIssue/Fighting the cyber hackers
unprotected crops is just not
protection enough. “It’s a game
that keeps on going,” he says.
“You can never sit back and think
you’re secure because the bad
guys will think of something.”
And while every stage of the
journey can be encrypted, part of
the cyber security expert’s role is to
look for opportunities that hackers
might use, balancing that with
individual privacy. “You track what’s
happening, so you see logs of
things within an application and if
you see that someone was trying
something you weren’t expecting,
you might think that’s interesting –
and then you build in more
protection.”
The challenge seems to be
endless, but recognition of this is
now topping the agenda in
enlightened boardrooms. “If you go
back three to five years, there
wouldn’t have been the
awareness,” says John, no
stranger to most leading CIOs and
CEOs.
“I haven’t met anyone at board
level in a Fortune 500 company not
versed about the enterprise risk
that cyber security presents,” he
adds. “I can’t imagine a scenario in
which cyber security isn’t on the list
of risk-management issues to look
out for.”
And, as the online environment
continues to grow, John’s
company looks set to remain one
of Fortune magazine’s top tech
stocks to watch. ■

Más contenido relacionado

Destacado

Deep Learning with MXNet - Dmitry Larko
Deep Learning with MXNet - Dmitry LarkoDeep Learning with MXNet - Dmitry Larko
Deep Learning with MXNet - Dmitry LarkoSri Ambati
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurSri Ambati
 
Build Secure IOT Solutions using Blockchain
Build Secure IOT Solutions using BlockchainBuild Secure IOT Solutions using Blockchain
Build Secure IOT Solutions using Blockchaingeetachauhan
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Destacado (7)

Deep Learning with MXNet - Dmitry Larko
Deep Learning with MXNet - Dmitry LarkoDeep Learning with MXNet - Dmitry Larko
Deep Learning with MXNet - Dmitry Larko
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
 
Build Secure IOT Solutions using Blockchain
Build Secure IOT Solutions using BlockchainBuild Secure IOT Solutions using Blockchain
Build Secure IOT Solutions using Blockchain
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Más de London Business School

Kuwait Petroleum Corporation: Transforming leadership for 2030 and beyond
Kuwait Petroleum Corporation: Transforming leadership for 2030 and beyondKuwait Petroleum Corporation: Transforming leadership for 2030 and beyond
Kuwait Petroleum Corporation: Transforming leadership for 2030 and beyondLondon Business School
 
Active vs. passive – practitioner perspectives
Active vs. passive – practitioner perspectivesActive vs. passive – practitioner perspectives
Active vs. passive – practitioner perspectivesLondon Business School
 
Partners Capital View of the Future of Private Equity Investing
Partners Capital View of the Future of Private Equity InvestingPartners Capital View of the Future of Private Equity Investing
Partners Capital View of the Future of Private Equity InvestingLondon Business School
 
Sharpening the Arithmetic of Active Management
Sharpening the Arithmetic of Active ManagementSharpening the Arithmetic of Active Management
Sharpening the Arithmetic of Active ManagementLondon Business School
 
The ten commandments of business innovation | London Business School
The ten commandments of business innovation | London Business SchoolThe ten commandments of business innovation | London Business School
The ten commandments of business innovation | London Business SchoolLondon Business School
 
Soren Jensen and London Business School - Driving organisational change
Soren Jensen and London Business School - Driving organisational changeSoren Jensen and London Business School - Driving organisational change
Soren Jensen and London Business School - Driving organisational changeLondon Business School
 
Corporate Governance Through Voice and Exit: Evidence from Standard Life Inve...
Corporate Governance Through Voice and Exit: Evidence from Standard Life Inve...Corporate Governance Through Voice and Exit: Evidence from Standard Life Inve...
Corporate Governance Through Voice and Exit: Evidence from Standard Life Inve...London Business School
 
Smurfit Kappa and London Business School
Smurfit Kappa and London Business SchoolSmurfit Kappa and London Business School
Smurfit Kappa and London Business SchoolLondon Business School
 
Systemic Risk in the Asset Management Industry
Systemic Risk in the Asset Management IndustrySystemic Risk in the Asset Management Industry
Systemic Risk in the Asset Management IndustryLondon Business School
 
Myths and Realities of ETFs and Index Investing
Myths and Realities of ETFs and Index InvestingMyths and Realities of ETFs and Index Investing
Myths and Realities of ETFs and Index InvestingLondon Business School
 
5 top reads on human potential | London Business School
5 top reads on human potential | London Business School5 top reads on human potential | London Business School
5 top reads on human potential | London Business SchoolLondon Business School
 
AQR Systematic Investing in Credit Markets
AQR Systematic Investing in Credit MarketsAQR Systematic Investing in Credit Markets
AQR Systematic Investing in Credit MarketsLondon Business School
 

Más de London Business School (20)

Kuwait Petroleum Corporation: Transforming leadership for 2030 and beyond
Kuwait Petroleum Corporation: Transforming leadership for 2030 and beyondKuwait Petroleum Corporation: Transforming leadership for 2030 and beyond
Kuwait Petroleum Corporation: Transforming leadership for 2030 and beyond
 
Microsoft and London Business School
 Microsoft and London Business School Microsoft and London Business School
Microsoft and London Business School
 
Active vs. passive – practitioner perspectives
Active vs. passive – practitioner perspectivesActive vs. passive – practitioner perspectives
Active vs. passive – practitioner perspectives
 
Portfolio Construction Today
Portfolio Construction TodayPortfolio Construction Today
Portfolio Construction Today
 
Partners Capital View of the Future of Private Equity Investing
Partners Capital View of the Future of Private Equity InvestingPartners Capital View of the Future of Private Equity Investing
Partners Capital View of the Future of Private Equity Investing
 
Risk taking the ATP way
Risk taking the ATP wayRisk taking the ATP way
Risk taking the ATP way
 
Is factor investing a bubble?
Is factor investing a bubble?Is factor investing a bubble?
Is factor investing a bubble?
 
Sharpening the Arithmetic of Active Management
Sharpening the Arithmetic of Active ManagementSharpening the Arithmetic of Active Management
Sharpening the Arithmetic of Active Management
 
Money management in equilibrium
Money management in equilibrium Money management in equilibrium
Money management in equilibrium
 
The ten commandments of business innovation | London Business School
The ten commandments of business innovation | London Business SchoolThe ten commandments of business innovation | London Business School
The ten commandments of business innovation | London Business School
 
Soren Jensen and London Business School - Driving organisational change
Soren Jensen and London Business School - Driving organisational changeSoren Jensen and London Business School - Driving organisational change
Soren Jensen and London Business School - Driving organisational change
 
Corporate Governance Through Voice and Exit: Evidence from Standard Life Inve...
Corporate Governance Through Voice and Exit: Evidence from Standard Life Inve...Corporate Governance Through Voice and Exit: Evidence from Standard Life Inve...
Corporate Governance Through Voice and Exit: Evidence from Standard Life Inve...
 
Telenor and London Business School
Telenor and London Business SchoolTelenor and London Business School
Telenor and London Business School
 
Smurfit Kappa and London Business School
Smurfit Kappa and London Business SchoolSmurfit Kappa and London Business School
Smurfit Kappa and London Business School
 
Systemic Risk in the Asset Management Industry
Systemic Risk in the Asset Management IndustrySystemic Risk in the Asset Management Industry
Systemic Risk in the Asset Management Industry
 
Myths and Realities of ETFs and Index Investing
Myths and Realities of ETFs and Index InvestingMyths and Realities of ETFs and Index Investing
Myths and Realities of ETFs and Index Investing
 
Systemic Risk in Asset Management
Systemic Risk in Asset Management Systemic Risk in Asset Management
Systemic Risk in Asset Management
 
Nordea and London Business School
Nordea and London Business School Nordea and London Business School
Nordea and London Business School
 
5 top reads on human potential | London Business School
5 top reads on human potential | London Business School5 top reads on human potential | London Business School
5 top reads on human potential | London Business School
 
AQR Systematic Investing in Credit Markets
AQR Systematic Investing in Credit MarketsAQR Systematic Investing in Credit Markets
AQR Systematic Investing in Credit Markets
 

Último

ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 

Último (20)

ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 

How to fight cyber crime

  • 2. ■TheBigIssue/Fighting the cyber hackers THE WORDS ‘CYBER SECURITY’ MAY have a futuristic ring to them, but they represent an issue that has the potential to affect all of us at home or on the move and at the companies we work for – even governments are defending their borders on a new online front. For John McAdam SEP27(1990), President and CEO of application delivery firm F5 Networks, the persistent and constant innovation of the hackers, phishers and online ne’er-do-wells has helped turn F5 Networks from a relatively small IT organisation with a $109m turnover when he joined in the burst-bubble phase of the dotcom boom to a business turning over well in excess of $1bn. And, while much of this may be attributable to his business prowess, he attributes recent growth – at least in part – to our love of all things mobile. “I have never seen such fast change as I’ve seen in the past couple of years,” he says. “Mobility has changed everything and is a real driver for our business.” And while that’s good news for businesses such as F5 Networks, it means that more of our intellectual property, personal, customer and company data is at risk. John defines cyber security in the big sense as securing the stability and integrity of the internet and the “whole online environment”. Things have moved on from the rather amateurish ‘phishing’ attacks, where hackers would put up bogus web shop- fronts of banks or emails requesting personal data. Now there are legion and far more coordinated forms of attack featuring techniques like ‘denial of service’ where servers are made to flood a website with data, effectively knocking it out. “This is where you get an organising, informal group of people who want to disrupt a business for whatever reason,” he says. “Then there are attacks on governments, and there are examples of blackmail attacks, where people from across the It’s a digital jungle out there, and any company that gets complacent about its cyber security is likely to pay a heavy price. Alumnus John McAdam’s company F5 Networks has become a business with a $1bn+ turnover by making applications fast, available and also secure, helping firms stay one step ahead of the hackers. He talks to PHIL HEARD
  • 3. ■TheBigIssue/Fighting the cyber hackers world have got together and said ‘unless you meet our demands we will bring your site down’.” The advent of mobile internet access combined with the ‘big data’ phenomenon that sees companies tracking and storing information on customer behaviour has multiplied the risks. “Big data complicates things. The ability to analyse vast data sets and draw meaningful conclusions from them means businesses know more about customers than ever before, especially in the online and retail spaces,” says John. The ethical balancing act between privacy and security is one for clients to mull over. Cyber security gatekeepers are too busy tackling the growth in mobility and the constant proliferation of apps, which are the most valuable target for hackers. “Making apps secure is a major challenge,” says John. For many of us, internet security may not extend beyond making sure that our virus software is up to date. But, as with flu jabs, these updates tend to be made from out- of-date material – or ‘signatures’ as they’re known. And relying solely on them is not enough. “A lot of security is built on signatures, and you need to make sure that they’re all up to date, but the way you get ahead is by using ‘policies’ – layers of them,” says John. These are the permissions that grant access for certain users to certain parts of a network or specific applications. Similarly, should an employee leave with a personal mobile phone, for example, company-specific data can be identified and removed, leaving their personal data intact. “You may encounter a policy as soon as you connect to a data centre whether you’re on office premises on a computer, or connecting in from an internet café on a mobile or a tablet,” says John. “Your device, where you are and other factors determine what you can access.” He advocates strongly the notion of application ‘firewalls’, which provide security and more policies at an application level. Every company will have a firewall to protect their servers, but having a walled garden filled with otherwise “It’s a game that keeps on going. You can never sit back and think you’re secure because the bad guys will think of something” JOHN McADAM SEP27(1990)
  • 4. ■TheBigIssue/Fighting the cyber hackers unprotected crops is just not protection enough. “It’s a game that keeps on going,” he says. “You can never sit back and think you’re secure because the bad guys will think of something.” And while every stage of the journey can be encrypted, part of the cyber security expert’s role is to look for opportunities that hackers might use, balancing that with individual privacy. “You track what’s happening, so you see logs of things within an application and if you see that someone was trying something you weren’t expecting, you might think that’s interesting – and then you build in more protection.” The challenge seems to be endless, but recognition of this is now topping the agenda in enlightened boardrooms. “If you go back three to five years, there wouldn’t have been the awareness,” says John, no stranger to most leading CIOs and CEOs. “I haven’t met anyone at board level in a Fortune 500 company not versed about the enterprise risk that cyber security presents,” he adds. “I can’t imagine a scenario in which cyber security isn’t on the list of risk-management issues to look out for.” And, as the online environment continues to grow, John’s company looks set to remain one of Fortune magazine’s top tech stocks to watch. ■