SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers

Jim Cook stories

Jim Cook is a prolific and insightful author who specializes in the realm of cybersecurity. With a clear focus on innovative technologies, his articles shed light on the importance of deception as a service for protecting the digital frontiers of Australian enterprises. Cook demonstrates a deep understanding of cyber defence mechanisms, emphasizing the use of deception technology to turn the tables on attackers and advocating for its integration into IT security strategies.

His interests don't stop at deception technology; Cook also delves into the challenges of modern cybersecurity threats such as ransomware, advocating for heightened cyber-awareness beyond the executive level and across entire organizations. He often highlights the significance of comprehensive training and the dire need for strategic investments to bolster national cyber defences. Through his writings, Cook stands as a guide, offering a mix of analysis and practical advice, from tackling Active Directory misconfigurations to ensuring the integrity of national elections against cyber threats.

As the regional director for ANZ at Attivo Networks, Jim Cook's expertise is showcased in pieces that range from the benefits of cyber deception for IT security teams to the nuances of establishing a strong cyber defence capability. By offering a strategic lens on the field, Cook's columns serve as an indispensable resource for those navigating the complex and ever-evolving cybersecurity landscape.

Img vtefwrrd1bbqsj3fmb5rvuvg

SentinelOne & Advantage revolutionise AI-driven MDR in NZ

Tue, 4th Jun 2024
SentinelOne and Advantage team up to integrate generative AI into MDR services, revolutionising enterprise security in New Zealand with PurpleAI.
Gettyimages 1168361427

Attivo Networks brings ThreatDefend Platform to Aus market with new distie agreement

Thu, 25th Nov 2021
Attivo Networks has chosen Exclusive Networks as its national distributor in Australia to meet growing demand in the region.
Attivooo

How credentials became an attacker’s easiest target

Wed, 10th Nov 2021
Even with education and phishing tests, users continue to hand over legitimate logins to attackers, who in turn exploit them with a high degree of success.
Compatible attivooo

Rise of the machine identities

Mon, 11th Oct 2021
Bots and infrastructure-as-code automation are common additions to the business landscape, and their explosion has not gone unnoticed by threat actors.
Cokoi

Pushing cyber-awareness beyond Australia’s C-level

Tue, 10th Aug 2021
Now that CEOs across ANZ properly understand cybersecurity and cyber-risks, it’s time to get the board of directors up to speed.
Gettyimages 1194195748  4

Sector training, further investment required in Australian Budget - ANZ cybersecurity vendors

Fri, 14th May 2021
Greater assistance needed to protect Australian businesses and employees from cyber threats, according to an industry expert.
Gettyimages 1202251440

A guide to combating Active Directory misconfigurations

Tue, 27th Apr 2021
With so many attacks abusing misconfigurations in Active Directory, it’s time to fix it, writes Attivo Networks regional director for ANZ Jim Cook.
Attivooo

The rising threat of human-controlled ransomware

Tue, 27th Oct 2020
Until recently, most ransomware attacks have been automated affairs. But things are changing, writes Attivo Networks regional director for ANZ Jim Cook.
Gettyimages 1163499476

Vectra and Attivo bring deception as a service to Aussie enterprises

Fri, 2nd Oct 2020
Vectra to bolster its cyber defences, embracing Attivo's cutting-edge deception tech to boost client security.
Cook

High-tech heist: why fending off ransomware attacks is more challenging than ever in 2020

Fri, 4th Sep 2020
Lion cyber-attack highlights growing ransomware threat to Australian businesses. Prime Minister warns of targeted attacks. #cybersecurity.
Gettyimages 1147405001

Video: 10 Minute IT Jams - Who is Attivo Networks?

Wed, 10th Jun 2020
TechDay’s new 10 Minute IT Jams series kicks off with an interview with Jim Cook, ANZ regional director of US-based cybersecurity firm Attivo Networks.
Compatible cook

Six benefits of initiating a deception strategy for IT security teams

Thu, 14th May 2020
Deception puts increased power into the hands of security teams by comprehensively protecting against attacks from both external parties and malicious insiders.
Andrew scully

Attivo Networks signs on Shelde as security channel partner

Thu, 7th May 2020
Attivo Networks has partnered with Melbourne-based Shelde to boost its Australian presence by leveraging Shelde's cybersecurity expertise and market reach.
Compatible cook

How small security teams can benefit from simple attack detection and response

Mon, 6th Apr 2020
When you have a small, expensive, generalist security team, it is an inefficient use of their time to be chasing down ghosts and false positives.
Compatible attivooo

Five ways cyber deception can help boost IT security

Mon, 10th Feb 2020
Cyber deception is gaining traction as a vital IT security tool. Here are five key ways it can thwart cybercriminals and bolster organisational defences.
47a

Nine ways to boost IT security during the summer holidays

Wed, 27th Nov 2019
With fewer users to manage, IT teams will likely have more capacity to carry out tasks that might have been overlooked during the busy business year.
38

Time to turn the tables on cyber-attackers

Mon, 4th Nov 2019
Australian businesses are adopting deception technology to counter cyber-attacks, mimicking attackers' tricks to safeguard critical systems and customer data.
Gettyimages 1129068169

Voter vulnerabilities: Cybersecurity risks impact national elections

Fri, 17th May 2019
The outcome of elections have an enormous impact on the political and cultural landscape of any democratic society.
Thinkstockphotos 639834324

Six IT security priorities to put in place for 2018

Tue, 14th Nov 2017
With 2017 winding down, Jim Cook, Malwarebytes ANZ regional director talks about the top 10 security concerns for the year ahead.
Thinkstockphotos 636198644

Four key steps to improving your cyber defence capabilities

Thu, 17th Aug 2017
IT professionals suffering from breach fatigue must rethink cyber security strategies and focus on cyber defence.