SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Stories by Ilan Rubin

Story image
Why businesses need a virtual firewall for optimal cloud protection
Last week
#
firewall
#
cloud services
#
network security
As cloud-based operations' security challenges mount, businesses are urged to employ virtual firewalls, crucial for preserving data integrity, enforcing compliance and retaining customer trust.
Story image
How businesses can transition to a single vendor SASE solution
Thu, 30th Nov 2023
#
network infrastructure
#
firewall
#
sd-wan
To address the challenges of complex security environments, vendors are now providing single-vendor SASE solutions.
Story image
Four steps organisations can take to improve cybersecurity awareness
Thu, 19th Oct 2023
#
data protection
#
phishing
#
email security
The message is clear: companies must adapt, empower, and educate. As the cyber landscape evolves, so must an organisation’s defences.
Story image
How the rise of the hybrid mesh firewall is revolutionising network security
Wed, 4th Oct 2023
#
network infrastructure
#
firewall
#
sd-wan
From complex, persistent attacks to stealthy attempts on non-traditional devices, cybercriminals are constantly refining their tactics.
Story image
Why existing employees could be the key to closing the cybersecurity skills gap
Wed, 13th Sep 2023
#
it training
#
cybersecurity
#
it departments
Upskilling existing employees offers a faster and potentially more cost-effective strategy to close the skills gap.
Story image
Improving organisation's productivity with hybrid architecture
Tue, 4th Jul 2023
#
digital transformation
#
wfh
#
cybersecurity
Traditional network architecture is no longer reliable enough for modern businesses and is being superseded by hybrid architecture.
Story image
Looking beyond cybersecurity: achieving better business outcomes
Mon, 26th Jun 2023
#
cybersecurity
#
wfh
#
cios
Today’s CISOs must expand their positions to ensure that the technology solutions and expertise delivered also extend to key business outcomes.
Story image
The need to create a strong cyber response framework
Thu, 18th May 2023
#
ransomware
#
it automation
#
cybersecurity
A cyber response framework should be a comprehensive and dynamic plan that looks at all aspects of incident response.
Story image
Why securing digital assets is critical for businesses
Fri, 28th Apr 2023
#
it training
#
cybersecurity
#
cso / ciso
Security hardening is an effective way to enhance cybersecurity by reducing a business's attack surface exposure and protecting it against hostile forces.
Story image
New Cybersecurity approaches for staying ahead of threats
Mon, 20th Mar 2023
#
iot
#
compliance
#
cybersecurity
UK Faces Rising Data Breach Threats as Cyber Threats Spill into Mainstream, According to New Report - @journalist #cybersecurity #datasecurity #IoT.
Story image
Why securing hybrid networks with next-generation firewalls is essential in an evolving landscape
Fri, 24th Feb 2023
#
firewall
#
network security
#
breach prevention
Hybrid networks pose significant challenges, particularly when there isn’t a centralised security strategy in place.
Story image
Why you need to make cybersecurity an urgent priority
Tue, 31st Jan 2023
#
iot
#
cybersecurity
#
cios
Geopolitical uncertainty, rapid Internet of Things (IoT) adoption, and accelerated digitalisation will continue to fuel cyberattacks in the years to come.
Story image
Improving the IT & user experience of SD-WAN with AIOps
Tue, 18th Oct 2022
#
network infrastructure
#
network management
#
cloud services
Organisations face growing pressure to strengthen their security posture with robust cybersecurity measures that protect against new and emerging threats.
Story image
Why critical infrastructure operators must urgently adopt a Zero Trust cybersecurity posture
Mon, 10th Oct 2022
#
digital transformation
#
critical infrastructure
#
security posture
The Australian government has implemented new legislation to address the increasing threat of cyberattacks on critical infrastructure.
Story image
Leveraging the human factor as part of an organisation’s overall cybersecurity framework
Wed, 31st Aug 2022
#
firewall
#
cloud services
#
network management
In the fight against cyberthreats, the human factor is often overlooked. Humans can be both a vulnerability and a defense. #cybersecurity.
Story image
Why comprehensive and secure SD-WAN solutions are essential for business success
Fri, 22nd Jul 2022
#
network management
#
network infrastructure
#
digital transformation
Organisations must choose a secure SD-WAN provider carefully to protect their network and customers, writes cybersecurity journalist.
Story image
How organisations can mitigate IoT and IIoT security risks
Wed, 6th Jul 2022
#
iot
#
cybersecurity
#
cios
The rapid growth of IoT and IIoT markets has raised security concerns. Here are five ways to mitigate the risks.
Story image
The importance of zero trust to secure the expanding edges of networks
Fri, 3rd Jun 2022
#
malware
#
wfh
#
saas
The rise of remote work has expanded the attack surface for cybercriminals. Implementing a zero trust approach to security is now essential.
Story image
How to protect expansive networks to ensure better results
Thu, 17th Feb 2022
#
malware
#
network infrastructure
#
cloud services
The increasing cost and growing prevalence of cyberattacks has many Australian and New Zealand businesses on edge.
Story image
The case for a new security platform based on three critical concepts
Fri, 21st Jan 2022
#
cloud services
#
breach prevention
#
ai
Gaining a truly integrated solution is the only way to reduce technology sprawl and consolidate an organisation’s platform.
Story image
Why secure SD-WAN is the key to leveraging 5G safely and effectively
Thu, 25th Nov 2021
#
firewall
#
cloud services
#
network infrastructure
Businesses in Australia are exploring the potential of 5G networks and the need for secure SD-WAN solutions to ensure success.
Story image
The importance of securing cloud deployments with the right services
Wed, 15th Sep 2021
#
cloud services
#
hybrid cloud
#
microsoft
It’s important to choose a partner that can recommend fit-for-purpose solutions developed specifically for the organisation’s unique requirements.
Story image
Securing the hybrid workforce
Fri, 13th Aug 2021
#
malware
#
phishing
#
nac
It's likely that organisations will need to find a way to work alongside COVID-19, which will probably involve a hybrid approach to work.
Story image
Why zero trust must form a key pillar of any cybersecurity strategy
Wed, 16th Jun 2021
#
vpn
#
malware
#
cybersecurity
Zero trust streamlines that access while strengthening security protections. For this reason, it should form an essential pillar of any cybersecurity strategy.