SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Stories by Joseph Carson

Img qz1nsd340er7m0h8pw8z4kv1

Change Your Password Day: Embracing stronger cybersecurity across Australia

Thu, 1st Feb 2024
#
uc
#
mfa
#
ai
On Change Your Password Day, Australians are encouraged to bolster their digital security by adopting longer, unique passphrases and using multi-factor authentication.
Joseph carson  chief security scientist  delinea

AI-driven cyberattacks and defences to create a battle of algorithms in 2024

Tue, 23rd Jan 2024
#
mfa
#
cloud security
#
passwordless
In 2024, it’s clear that cybersecurity will remain a top priority for organisations and governments worldwide.
Gettyimages 645455730

Digital DNA theft could be coming in 2023

Wed, 14th Dec 2022
#
ransomware
#
advanced persistent threat protection
#
ai
With the increasing use of artificial intelligence, and quantum computing expected to soon become a reality, the cyber threatscape is changing more than ever.
Gettyimages 649191180

Securing shadow IT – May the force be with you!

Mon, 11th Jul 2022
#
devops
#
casb
#
apm
Shadow IT is increasing in organizations, making their cyber attack surfaces bigger than they realize. Here's how to bring it under control.
Gettyimages 474175226

Legislative compliance requires privileged access management

Mon, 11th Apr 2022
#
pam
#
risk & compliance
#
cybersecurity
Australia's Security Legislation Amendment (Critical Infrastructure) Act 2021, extends cybersecurity provisions to data, finance, water, energy, and more.
Joseph carson  chief security scientist  delinea

Vale 2021, hello 2022: on the brink of full-out cyberwar

Mon, 6th Dec 2021
#
malware
#
ransomware
#
zero trust security
2022 could be the year of a full-out cyberwar, with governments gearing up to strike back against cybercriminals.
Gettyimages 1341709611

Zero Trust means strong, frictionless PAM and other controls

Tue, 9th Nov 2021
#
malware
#
pam
#
mfa
Imagine an organisation’s information infrastructure as something like a bank’s safe deposit box service, with security guards on the door.
Gettyimages 843095360

Secure cloud migration with privileged access management

Wed, 13th Oct 2021
#
pam
#
cybersecurity
#
opinion
PAM can offer insight into risks that may be adjusted depending on the threat landscape, writes ThycoticCentrify chief security scientist Joseph Carson.
Cybersecurity19

Protecting endpoints (and users) that have left the office

Fri, 30th Apr 2021
#
endpoint protection
#
mfa
#
iam
To access work emails, it may suffice to use with multi-factor authentication. But if users want to access customer data, that security control isn’t enough.
Gettyimages 1207994728

How do you make cybersecurity tech buying decisions? Here’s what your peers say

Wed, 10th Feb 2021
#
cybersecurity
#
investment
#
opinion
Over half of IT security decision-makers plan to increase security budgets, but 37% of proposals for cybersecurity investment are turned down.
Identity and access management 5

Thycotic debunks top Privileged Access Management myths

Tue, 23rd Apr 2019
#
pam
#
iam
#
cybersecurity
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.