IT Brief Australia logo
Technology news for Australia's largest enterprises

Cybersafety news stories - Page 1

Story image
Zoom
Zoom puts greater focus on the platform's security and privacy
Zoom has recently received a variety of third-party certifications, unveiled product innovations, and established programs, focusing on security and privacy.
Story image
Social Media
TikTok's unveils plans to safeguard and diversify recommendations
TikTok has unveiled new details about the platform's work to safeguard and diversify its recommendation system. 
Story image
Cybersecurity
Waikato DHB warned a cyberattack 'catastrophic for patient safety'
Waikato DHB was warned its IT security was severely compromised months before a massive ransomware attack that brought Waikato Hospital to its knees.
Story image
Cybersecurity
Why the biggest cyber-attacks go undetected
Data breaches and cyber-attacks are not singular events. They are an ongoing process with multiple steps.
Story image
Cybersecurity
How credentials became an attacker’s easiest target
Even with education and phishing tests, users continue to hand over legitimate logins to attackers, who in turn exploit them with a high degree of success.
Story image
Cybersecurity
The threat model as a compass
Just like a compass, regularly reviewing the threat model keeps the CTI teams IR’s pointed in the right direction over time.
Story image
Ransomware
How businesses unknowingly leave themselves at risk
Recent cyber-events highlight the risks confronting enterprises that depend on a single vendor for their infrastructure, tools, and security.
Story image
Cybersecurity
Zero trust in NZ, and its rise from fringe approach to industry standard
The guiding principle of a zero trust security model is that no-one in an organisation — from a new recruit to the CISO — is granted intrinsic trust to access the network.
Story image
BYOD / Bring Your Own Device
The rising importance of mainframe security
Mainframe-reliant organisations should maintain a robust security posture to ensure that data remains secure.
Story image
Cybersecurity
How an intelligence-driven approach can close the XDR gap
Extended detection and response (XDR) has become the white-hot name in the security world, writes Anomali senior VP and GM Stree Naidu.
Story image
SaaS
NZ organisations see cybersecurity boost as TechnologyOne upgrades platform
The company has completed a ‘significant architectural redesign’ of its security in collaboration with Amazon Web Services (AWS).
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - BeyondTrust CTO discusses common attack vectors in 2021
In Techday's third and final IT Jam with BeyondTrust, we speak to Marc Maiffret, who is the company's CTO.
Story image
Phishing
Technology, not training, protects users from phishing
Businesses should prioritise utilisation of readily available authentication technologies to prevent the ongoing phishing threat.
Story image
Cybersecurity
ESET and Chillisoft launch MDR solution in A/NZ
The MDR service offers customers remotely delivered security operation centre capabilities, which can be used to respond to threats.
Story image
Cybersecurity
Secureworks expands EDR portfolio with two new solutions
The two new tools will give customers access to ‘comprehensive prevention, detection, and response protection across the attack surface’.
Story image
Remote Working
Secure your new hybrid workplace – because it’s here to stay
Identity and access management are poised to take centre stage in the next phase of corporate security revamp, writes Entrust security director for APJ James Cook.
Story image
Ransomware
Playing dumb no longer an option against ransomware reporting
Given the massive amounts of data enterprises hold, it may seem like an impossible task to prove what data was accessed and by whom. It isn’t. 
Story image
Privileged Access Management / PAM
Secure cloud migration with privileged access management
PAM can offer insight into risks that may be adjusted depending on the threat landscape, writes ThycoticCentrify chief security scientist Joseph Carson.
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - An update from WatchGuard Technologies
WatchGuard Technologies is a cybersecurity company specialising in endpoint security, secure Wi-Fi, multi-factor authentication, and network intelligence.
Story image
Digital Credentials
Countering the rise of credential-based attacks
By implementing behavioural analytics and smart password practices, security teams can thwart credential-based attacks across the organisation.
Story image
Cybersafety
When it comes to malware, think like James Bond and trust no-one
Implementing advanced threat protection (ATP) as part of a zero trust SASE architecture is an important step in proactively blocking known and zero-day threats.
Story image
Ransomware
How can businesses prepare for ransomware?
To prevent attacks, organisations should apply preventive security controls that reduce the attack surface and test those controls against a ransomware attack scenario.
Story image
Ransomware
From ransomware to RansomOps: Why the ‘new kid on the block’ spells trouble for the unprepared enterprise
When teams have a clear view of all assets and treat them equally, then they are much closer to stopping attacks in their tracks.
Story image
Cybersecurity
Hackers have evolved since COVID-19 but have cyber-defences kept pace?
It is critical to understand how effective each security product is in stopping the new tactics that the hackers have been using since COVID-19.