IT Brief Australia logo
Technology news for Australia's largest enterprises

Cybersafety news stories - Page 3

Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - Who is Exabeam?
Exabeam is cybersecurity and analytics solution provider, specialising in threat detection, investigation, and response (TDIR).
Story image
Cybersecurity
What makes a security analyst successful? Investigative thinking
Empowering humans to engage in critical thinking is vital to efficient detection and response, writes ThreatQuotient APJC regional director Anthony Stitt.
Story image
CASB
The promise and peril of the cloud: why a people-centric approach is vital
Two-thirds of Australian CISOs see cloud account compromise as the most significant risk to their organisation in the next year.
Story image
Managed Detection and Response/ MDR
Leveraging a new MSSP/MDR SOC contract to build an intelligence practice
Few organisations have matured their security operations (SecOps) to the point where they have integrated a complete CTI practice. 
Story image
Cybersecurity
Three ways Shark Week mirrors cybersecurity marketing
Here are three ways that myths are spread by Shark Week and how they are analogous to the myths currently percolating in cybersecurity marketing.
Story image
Cloud
Forcepoint appoints Rees Johnson as new CPO
A 20 year veteran in the network security field, Johnson will bring experience in product management, cloud security and SaaS migration strategy, the company says.
Story image
Cybersecurity
The Magnificent 7: Critical functions that underpin every cybersecurity practice
With this approach, technology services providers can build a robust cybersecurity practice that protects their customers’ businesses from cybercriminals.
Story image
Cybersecurity
Compliance with Essential Eight cybersecurity has more business benefits than you might think
There used to be two certainties in life: death and taxes. For organisations at least, there is now a third — compliance with cybersecurity regulation.
Story image
Zero trust
Securing the hybrid workforce
It's likely that organisations will need to find a way to work alongside COVID-19, which will probably involve a hybrid approach to work. 
Story image
Ransomware
More than a third of global organisations have experienced ransomware — report
The report found increasing instances of ransomware victims experiencing multiple breach events, as well as a rise in the average ransom payment.
Story image
Cybersecurity
Protecting organisations with cyber-resilience at the core
As organisations ramp up their digital transformation efforts, there are three key areas that business executives must consider to bolster cybersecurity.
Story image
CISO
Pushing cyber-awareness beyond Australia’s C-level
Now that CEOs across A/NZ properly understand cybersecurity and cyber-risks, it’s time to get the board of directors up to speed.
Story image
Malware
'Trash Panda as a Service' has been upgraded to steal cryptocurrency
Raccoon Stealer, a malware platform that rents out its services for $75 a week, has upgraded its services, according to a new report from Sophos.
Story image
Cybersecurity
Skybox Security announces broad expansion across APAC and EMEA
Security posture management company Skybox Security has announced an ‘accelerated global expansion’ following a surge in customer demand.
Story image
Bitglass
Why IT needs smarter cloud security
Organisations are becoming increasingly reliant on cloud-based applications for employees who spend more time working remotely, putting more pressure on security.
Story image
Threat intelligence
Companies must be on the same page to achieve strategic & tactical CTI management
An effective CTI program requires the alignment of people, processes and technology, writes ThreatQuotient APJC regional director Anthony Stitt.
Story image
TLS
What Is TLS 1.2 — and why should we still care?
Gigamon country manager for A/NZ George Tsoukas takes a closer look at the history of cryptographic protocols.
Story image
Cloud
Cybersecurity roadblocks: 5 things leaders need to act on now
In 2021, organisations must focus on security as the foundation for safely creating, storing and managing data.
Story image
Data breach
Beware the top three blind spots that precede cloud data breaches
The ability to correlate individual events/alerts over time into an attack ‘storyline’ can help mitigate major cloud security blind spots.
Story image
Cloud
Cybersecurity in the age of AI
Autonomous Response is necessary not only because humans cannot keep up with today’s threat climate, but because AI-based attacks are approaching. 
Story image
Cybersecurity
vArmour joins Microsoft Intelligent Security Association
Armed with vArmour’s solutions, the company says that Microsoft’s customers can now gain more visibility over user access to critical applications.
Story image
Network Detection and Response / NDR
Barracuda acquires XDR platform SKOUT Cybersecurity
With the acquisition, Barracuda begins its foray into the XDR market, and supplements the company’s previous integrations with Open XDR platforms.
Story image
Cybersecurity
Ignorance is bliss — for hackers
Failure to employ best-of-breed security practices may result in a very uncomfortable talk with CEOs and boards of directors.
Story image
Cybersecurity
Interview: Assessing the challenges in securing emerging technologies
In his almost 20 years in the cybersecurity industry, Infosys CISO Vishal Salvi has watched threats change — and how they've ramped up in the last 18 months.