IT Brief Australia - Technology news for CIOs & IT decision-makers

Stories by Jim Cook

Story image
How credentials became an attacker’s easiest target
Wed, 10th Nov 2021
#
iam
#
cybersecurity
#
cybersafety
Even with education and phishing tests, users continue to hand over legitimate logins to attackers, who in turn exploit them with a high degree of success.
Story image
Rise of the machine identities
Mon, 11th Oct 2021
#
devops
#
multi-cloud
#
apm
Bots and infrastructure-as-code automation are common additions to the business landscape, and their explosion has not gone unnoticed by threat actors.
Story image
Pushing cyber-awareness beyond Australia’s C-level
Tue, 10th Aug 2021
#
risk & compliance
#
cybersecurity
#
cso / ciso
Now that CEOs across ANZ properly understand cybersecurity and cyber-risks, it’s time to get the board of directors up to speed.
Story image
The rising threat of human-controlled ransomware
Tue, 27th Oct 2020
#
malware
#
ransomware
#
cybersecurity
Until recently, most ransomware attacks have been automated affairs. But things are changing, writes Attivo Networks regional director for ANZ Jim Cook.
Story image
High-tech heist: why fending off ransomware attacks is more challenging than ever in 2020
Fri, 4th Sep 2020
#
malware
#
ransomware
#
cybersecurity
Lion cyber-attack highlights growing ransomware threat to Australian businesses. Prime Minister warns of targeted attacks. #cybersecurity.
Story image
Six benefits of initiating a deception strategy for IT security teams
Thu, 14th May 2020
#
cybersecurity
#
strategic it
#
deception technology
Deception puts increased power into the hands of security teams by comprehensively protecting against attacks from both external parties and malicious insiders.
Story image
How small security teams can benefit from simple attack detection and response
Mon, 6th Apr 2020
#
advanced persistent threat protection
#
breach prevention
#
cybersecurity
When you have a small, expensive, generalist security team, it is an inefficient use of their time to be chasing down ghosts and false positives.
Story image
Five ways cyber deception can help boost IT security
Mon, 10th Feb 2020
#
cybersecurity
#
attivo networks
#
retailers
Cyber deception is gaining traction as a vital IT security tool. Here are five key ways it can thwart cybercriminals and bolster organisational defences.
Story image
Nine ways to boost IT security during the summer holidays
Wed, 27th Nov 2019
#
christmas
#
attivo networks
#
cybersecurity strategy
With fewer users to manage, IT teams will likely have more capacity to carry out tasks that might have been overlooked during the busy business year.
Story image
Time to turn the tables on cyber-attackers
Mon, 4th Nov 2019
#
firewalls
#
network infrastructure
#
network security
Australian businesses are adopting deception technology to counter cyber-attacks, mimicking attackers' tricks to safeguard critical systems and customer data.
Story image
Voter vulnerabilities: Cybersecurity risks impact national elections
Fri, 17th May 2019
#
elections
#
online voting
#
malwarebytes
The outcome of elections have an enormous impact on the political and cultural landscape of any democratic society.
Story image
Six IT security priorities to put in place for 2018
Tue, 14th Nov 2017
#
dr
#
cloud services
#
malwarebytes
With 2017 winding down, Jim Cook, Malwarebytes ANZ regional director talks about the top 10 security concerns for the year ahead.
Story image
Four key steps to improving your cyber defence capabilities
Thu, 17th Aug 2017
#
data protection
#
breach prevention
#
cybersecurity
IT professionals suffering from breach fatigue must rethink cyber security strategies and focus on cyber defence.