SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers

Joseph Carson stories

Story image
Change Your Password Day: Embracing stronger cybersecurity across Australia
Thu, 1st Feb 2024
#
ml
#
ai
#
cios
On Change Your Password Day, Australians are encouraged to bolster their digital security by adopting longer, unique passphrases and using multi-factor authentication.
Story image
Delinea report highlights switch in ransomware techniques
Wed, 31st Jan 2024
#
pam
#
ransomware
#
cybersecurity
Delinea's annual ransomware report reveals cybercriminals' shift to stealthier exfiltration methods, with mid-sized businesses being prime targets.
Story image
AI-driven cyberattacks and defences to create a battle of algorithms in 2024
Tue, 23rd Jan 2024
#
cloud security
#
ai
#
cybersecurity
In 2024, it’s clear that cybersecurity will remain a top priority for organisations and governments worldwide.
Story image
Delinea research reveals emerging cyber insurance gap
Thu, 31st Aug 2023
#
accounting systems
#
digital banking
#
censuswide
Delinea reveals a significant cyber insurance gap is emerging as providers evolve to reduce their exposure while organisations ignore the fine print.
Story image
Are passwords becoming obsolete? New research finds out
Wed, 16th Aug 2023
#
cybersecurity
#
black hat
#
passwords
Over half of business hall attendees at the 2023 BlackHat USA Conference believe passwordless is viable, says Delinea survey.
Story image
Delinea awarded for cybersecurity mitigation solutions
Thu, 8th Jun 2023
#
pam
#
cybersecurity
#
awards
Delinea takes home a series of wins, including the ‘Evolutionary Security Solution’ honour in the Future Security Awards 2023.
Story image
Cybersecurity often overlooked by business leaders: Delinea
Thu, 11th May 2023
#
cybersecurity
#
cyber attacks
#
apac
The disconnect between security and business goals often has negative consequences, as it increases the success of cyberattacks at one in four companies.
Story image
Cloud security remains top cybersecurity concern in 2023
Tue, 2nd May 2023
#
wfh
#
ransomware
#
cloud security
Cloud security continues to be the most pressing concern for cybersecurity professionals in 2023, more than ransomware and remote workers.
Story image
Digital DNA theft could be coming in 2023
Wed, 14th Dec 2022
#
ransomware
#
advanced persistent threat protection
#
ai
With the increasing use of artificial intelligence, and quantum computing expected to soon become a reality, the cyber threatscape is changing more than ever.
Story image
Delinea a Champion of Cybersecurity Awareness Month
Thu, 13th Oct 2022
#
cybersecurity
#
pam
#
cios
Delinea has announced its industry leadership as a Champion of Cybersecurity Awareness Month, joining the effort to encourage safer digital privacy behaviour.
Story image
Delinea report finds organisations are struggling to grasp identity-related security
Thu, 28th Jul 2022
#
cloud services
#
advanced persistent threat protection
#
identity
New research reveals that 84% of organizations in Australia, New Zealand, Singapore, and Malaysia have experienced an identity-related security breach.
Story image
Gartner names Delinea a Leader in 2022 Magic Quadrant
Mon, 25th Jul 2022
#
cloud services
#
pam
#
gartner
Gartner has named Delinea as a Leader in the 2022 Gartner Magic Quadrant for Privileged Access Management (PAM).
Story image
Securing shadow IT – May the force be with you!
Mon, 11th Jul 2022
#
cloud services
#
wfh
#
devops
Shadow IT is increasing in organizations, making their cyber attack surfaces bigger than they realize. Here's how to bring it under control.
Story image
Delinea’s Joseph Carson recognised with OnCon Icon Award
Tue, 5th Jul 2022
#
cybersecurity
#
awards
#
leadership
Delinea's Joseph Carson recognised as a Top 50 Information Security Professional in the 2022 OnCon Icon Awards.
Story image
Legislative compliance requires privileged access management
Mon, 11th Apr 2022
#
pam
#
compliance
#
cybersecurity
Australia's Security Legislation Amendment (Critical Infrastructure) Act 2021, extends cybersecurity provisions to data, finance, water, energy, and more.
Story image
Future-proofing relies on cloud automation, report finds
Mon, 28th Mar 2022
#
multi-cloud
#
pam
#
cybersecurity
The report highlights that cloud automation is the key to future-proofing cybersecurity, especially when coupled with autonomous privileges and access.
Story image
Vale 2021, hello 2022: on the brink of full-out cyberwar
Mon, 6th Dec 2021
#
ransomware
#
malware
#
cybersecurity
2022 could be the year of a full-out cyberwar, with governments gearing up to strike back against cybercriminals.
Story image
Zero Trust means strong, frictionless PAM and other controls
Tue, 9th Nov 2021
#
malware
#
pam
#
cybersecurity
Imagine an organisation’s information infrastructure as something like a bank’s safe deposit box service, with security guards on the door.
Story image
Secure cloud migration with privileged access management
Wed, 13th Oct 2021
#
pam
#
cybersecurity
#
cios
PAM can offer insight into risks that may be adjusted depending on the threat landscape, writes ThycoticCentrify chief security scientist Joseph Carson.
Story image
Risky business: Majority of workers take cybersecurity shortcuts despite knowing dangers
Fri, 30th Jul 2021
#
malware
#
ransomware
#
cybersecurity
Workers engaging in risky behaviors are putting their company's digital security at risk, according to a global survey by ThycoticCentrify.
Story image
Protecting endpoints (and users) that have left the office
Fri, 30th Apr 2021
#
endpoint protection
#
edr
#
cybersecurity
To access work emails, it may suffice to use with multi-factor authentication. But if users want to access customer data, that security control isn’t enough.
Story image
How do you make cybersecurity tech buying decisions? Here’s what your peers say
Wed, 10th Feb 2021
#
cybersecurity
#
investment
#
cybersafety
Over half of IT security decision-makers plan to increase security budgets, but 37% of proposals for cybersecurity investment are turned down.
Story image
Thycotic debunks top Privileged Access Management myths
Tue, 23rd Apr 2019
#
pam
#
iam
#
cybersecurity
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.