IT Brief Australia logo
Technology news for Australia's largest enterprises

Cybersafety news stories - Page 4

Story image
Cybersecurity
Why zero trust must form a key pillar of any cybersecurity strategy
Zero trust streamlines that access while strengthening security protections. For this reason, it should form an essential pillar of any cybersecurity strategy.
Story image
Printers
How organisations can protect their print privacy in a digital world
Learning how to better protect the data used and stored by organisations’ print systems is in their best interests for the company’s future success.
Story image
Ransomware
How to recover from a ransomware attack faster and return to business acceleration
When an organisation can recover quickly from a ransomware attack, organisations can accelerate growth safely and reliably.
Story image
Cybersecurity
Proactively mitigate cyber risk with MISP and TheHive
When an attack happens, security teams should be ready with information about who is attacking and the steps being taken to mitigate damage.
Story image
DDoS
DDoS attack report finds attack volumes up dramatically
The DDoS attack report analyses attack activity by industries, attack vectors, DDoS attacks on applications and on-premise versus cloud.
Story image
Secure access service edge / SASE
How SASE is helping organisations forge new digital work experiences
More organisations are reimagining the way that staff connect from remote locations, writes ThousandEyes principal solutions architect Mike Hicks.
Story image
Cybersecurity
Healthcare, manufacturing and finance sectors accounted for 62% of all cyber-attacks in 2020
The healthcare industry was the hardest hit, with 97% of all hostile activity targeted at the industry being web application or application-specific attacks.
Story image
Cybersecurity
Three ways to prioritise cybersecurity for maximum protection
CISOs should implement this three-pronged approach to prioritising cybersecurity concerns, writes Fortinet regional director for ANZ Jon McGettigan.
Story image
Cybersecurity
Spending on cybersecurity and risk management tech to hit $150 billion in 2021
“Looking ahead, we’re seeing early market signals of growing automation and further adoption of machine learning technologies in support of AI security." 
Story image
Cybersecurity
Best practices and key factors for identity management
In parallel with any physical form of identification, digital identities must be protected at all costs to prevent identity theft or fraud.
Story image
Network Detection and Response / NDR
The challenge of ensuring effective protection against DNS attacks
The ways in which bad actors can use DNS to mount attacks are numerous. Here are some of the most popular ones.
Story image
Cybersecurity
Video: 10 Minute IT Jams - SonicWall manager dissects zero trust security
Today’s interviewee is SonicWall head of presales for APAC, Yuvraj Pradhan, who discusses various talking points surrounding zero trust security.
Story image
DevOps
Why DevSecOps must strive for effective enforcement measures
Threats to applications go beyond exploiting code and logic vulnerabilities which are already more than enough to analyse and cope with.
Story image
Artificial Intelligence
'Catastrophic forgetting': What it is, and how to prevent it
AI has been used to combat cyber-threats for years. But there are many related pitfalls — and catastrophic forgetting is a major one.
Story image
Cybersecurity
Protecting endpoints (and users) that have left the office
To access work emails, it may suffice to use with multi-factor authentication. But if users want to access customer data, that security control isn’t enough.
Story image
Cybersecurity
Why the rise of containers has created a vulnerability crisis
A rise in the use of Kubernetes and Docker services — and increased adoption of DevOps methodologies — have all contributed to the rise in popularity of containers. But as with all emerging technologies, there are risks.
Story image
Cybersecurity
A guide to combating Active Directory misconfigurations
With so many attacks abusing misconfigurations in Active Directory, it’s time to fix it, writes Attivo Networks regional director for ANZ Jim Cook.
Story image
Cybersecurity
Video: 10 Minute IT Jams - Who is Barracuda?
Barracuda is a cybersecurity company that provides security, networking and storage products based on network appliances and cloud services.
Story image
Cybersecurity
Six key characteristics of a modern secure web gateway
For organisations to continue to thrive in a distributed work environment, they must ensure that security is also modernised to support new realities appropriately.
Story image
SD-WAN
Why organisations should make adaptability their #1 security requirement
Adaptability is the key to providing a strong security posture for organisations that are still weighing up their future scenarios to secure a workforce that is largely distributed versus one that’s mainly in the office. 
Story image
Cybersecurity
97% of organisations experienced a mobile threat in 2020 — report
93% of these attacks originated in a device network, which includes attempts to trick users into installing a malicious payload via infected websites or URLs, or to steal users’ credentials.
Story image
Cybersecurity
Video: 10 Minute IT Jams - SonicWall VP on the cybersecurity lessons learned from the last 12 months
This is our seventh IT Jam with SonicWall, the cybersecurity company specialising in firewall, network security, cloud security and more.
Story image
Cybersecurity
Why a more secure organisation is a collective responsibility
With vast volumes of data moving to the cloud, many IT professionals are frequently challenged to protect their enterprise environment, and there is a greater focus being placed on advancing cybersecurity strategies.
Story image
Cybersecurity
Video: 10 Minute IT Jams - Radware VP on the challenges of cloud security
In this interview, Techday speaks to Radware vice president of technologies Yaniv Hoffman, who discusses the primary challenges facing IT organisations in terms of their cloud security apparatus.