Stories by Scott Hesford

Effective ways to improve security by avoiding privilege creep
Fri, 22nd Nov 2024
#
firewalls
#
network security
#
mfa
In a digital landscape fraught with data breaches, organisations must tackle the silent threat of privilege creep to safeguard sensitive information.

How your organisation can get exception handling of one-off requests right
Tue, 14th May 2024
#
datacentre infrastructure
#
application security
#
cybersecurity
When users encounter allowlisting restrictions, it matters how these are handled—in the backend for maintaining security posture and in the front end for user experience.

Aussie firms must contextualize rising cyber incident data
Wed, 6th Dec 2023
#
ransomware
#
pam
#
mfa
Compromised credentials are at the root of most cyber incidents in Australia, yet you could be forgiven for thinking ransomware is still the greatest single threat.

The three-stage path to a more secure IT environment
Wed, 26th Jul 2023
#
firewalls
#
network infrastructure
#
network security
Organisations in Australia and New Zealand are adopting a graduated approach to privileged access management to enhance security.

‘Windows shops’ target admin rights to de-risk their environments
Wed, 17th Aug 2022
#
cybersecurity
#
windows
#
users
New data shows up to 75% of critical vulnerabilities could be mitigated through a rights and privileges crackdown.