SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Stories by Joseph Carson

Story image
Digital DNA theft could be coming in 2023
Wed, 14th Dec 2022
#
ransomware
#
ai
#
cybersecurity
With the increasing use of artificial intelligence, and quantum computing expected to soon become a reality, the cyber threatscape is changing more than ever.
Story image
Securing shadow IT – May the force be with you!
Mon, 11th Jul 2022
#
wfh
#
devops
#
app development
So-called "shadow IT" is often invisible to security and IT staff, making organisations' cyber attack surfaces bigger than they realise, and less secure.
Story image
Legislative compliance requires privileged access management
Mon, 11th Apr 2022
#
cybersecurity
#
pam
#
compliance
Australia's Security Legislation Amendment (Critical Infrastructure) Act 2021, extends cybersecurity provisions to data, finance, water, energy, and more.
Story image
Vale 2021, hello 2022: on the brink of full-out cyberwar
Mon, 6th Dec 2021
#
ransomware
#
malware
#
cybersecurity
As organisations move to more strategic decision making and re-evaluate the risks of the difficult and unexpected accelerated transition, cyber threats have increased dramatically, and organisations are more exposed than ever.
Story image
Zero Trust means strong, frictionless PAM and other controls
Tue, 9th Nov 2021
#
malware
#
pam
#
mfa
Imagine an organisation’s information infrastructure as something like a bank’s safe deposit box service, with security guards on the door.
Story image
Secure cloud migration with privileged access management
Wed, 13th Oct 2021
#
pam
#
cybersecurity
#
cybersafety
PAM can offer insight into risks that may be adjusted depending on the threat landscape, writes ThycoticCentrify chief security scientist Joseph Carson.
Story image
Protecting endpoints (and users) that have left the office
Fri, 30th Apr 2021
#
endpoint protection
#
cybersecurity
#
edr
To access work emails, it may suffice to use with multi-factor authentication. But if users want to access customer data, that security control isn’t enough.
Story image
How do you make cybersecurity tech buying decisions? Here’s what your peers say
Wed, 10th Feb 2021
#
cybersecurity
#
investment
#
cybersafety
Global research commissioned by Thycotic takes a close look at how IT and security professionals make technology buying decisions, and what influences boards to invest in cybersecurity.
Story image
Thycotic debunks top Privileged Access Management myths
Tue, 23rd Apr 2019
#
pam
#
cybersecurity
#
iam
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
© 2023 Techday, All rights reserved. Hosted on Plan B's Cloud Services. DMARC protection by PowerDMARC.