IT Brief Asia - Technology news for CIOs & IT decision-makers

Scott Hesford stories

Scott Hesford is an insightful voice in the realm of cybersecurity, specifically focusing on the challenges that Australian businesses face today. Through his various articles and videos, he delves into the key elements affecting the industry's landscape, providing a nuanced understanding of evolving threats and defense strategies.

His recent stories highlight the importance of context in cybersecurity discussions, including the rising incidence of compromised credentials and the necessity for robust preventive measures. These insights can reshape how organisations view their cybersecurity frameworks, emphasizing a proactive rather than reactive approach.

By examining the concerns outlined in reports and surveys, such as those revealing heightened anxiety around cyberattacks following the pandemic, readers can gain a deeper appreciation of the current security climate. Hesford's focus on critical vulnerabilities and essential security frameworks like the Essential Eight provides actionable knowledge that can enhance an organisation's security posture.

Moreover, he offers practical advice on managing permissions and access rights, illustrating how targeted security strategies can mitigate risks associated with privilege creep. Through these lessons, readers can develop a more comprehensive understanding of cybersecurity challenges and the steps necessary to fortify their systems.

Story image
Just-in-time access emerges as key to mitigating risk
Last month
#
saas
#
data protection
#
pam
As organisations increasingly turn to cloud solutions, Just-in-Time access emerges as a vital strategy to mitigate security risks linked to access privileges.
Story image
Effective ways to improve security by avoiding privilege creep
Fri, 22nd Nov 2024
#
firewalls
#
network security
#
mfa
In a digital landscape fraught with data breaches, organisations must tackle the silent threat of privilege creep to safeguard sensitive information.
Story image
How your organisation can get exception handling of one-off requests right
Tue, 14th May 2024
#
datacentre infrastructure
#
application security
#
cybersecurity
When users encounter allowlisting restrictions, it matters how these are handled—in the backend for maintaining security posture and in the front end for user experience.
Story image
Aussie firms must contextualize rising cyber incident data
Wed, 6th Dec 2023
#
ransomware
#
pam
#
mfa
Compromised credentials are at the root of most cyber incidents in Australia, yet you could be forgiven for thinking ransomware is still the greatest single threat.
Story image
The three-stage path to a more secure IT environment
Wed, 26th Jul 2023
#
firewalls
#
network infrastructure
#
network security
Organisations in Australia and New Zealand are adopting a graduated approach to privileged access management to enhance security.
Story image
Australian enterprises prioritise the Essential Eight
Tue, 6th Jun 2023
#
fintech
#
financial systems
#
cybersecurity
90% of Australian organisations plan to align their security programs to the Essential Eight, becoming a standard cybersecurity strategy nationwide.
Story image
Malicious attacks leading source of data breaches
Thu, 2nd Mar 2023
#
breach prevention
#
cybersecurity
#
data breach
Businesses need to keep their prevention and detection technologies top of mind by ensuring that they have the appropriate protective controls in place.
Story image
‘Windows shops’ target admin rights to de-risk their environments
Wed, 17th Aug 2022
#
cybersecurity
#
windows
#
users
New data shows up to 75% of critical vulnerabilities could be mitigated through a rights and privileges crackdown.
Story image
Australian IT security concerns higher than before pandemic
Thu, 11th Aug 2022
#
cybersecurity
#
cyber attacks
#
beyondtrust
Australian organisations are more concerned about cyberattacks than they were prior to the COVID-19 pandemic, according to a new survey.
Story image
Cybersecurity concerns higher than before the pandemic - report
Wed, 10th Aug 2022
#
malware
#
zero trust security
#
hybrid & remote work
BeyondTrust's new survey shows Australian organisations are more concerned about cyberattacks than they were before the COVID-19 pandemic.
Story image
Video: 10 Minute IT Jams - BeyondTrust on securing critical infrastructure
Thu, 22nd Jul 2021
#
pam
#
cloud security
#
iot security
In TechDay's second IT Jam with BeyondTrust, we speak to the company's sales engineer Scott Hesford about critical infrastructure and how best to secure it.