Articles

  • 2 weeks ago | itbrief.com.au | Scott Hesford

    The digital landscape for businesses has been fundamentally reshaped by the widespread adoption of cloud computing and Software-as-a-Service (SaaS) solutions. Organisations across diverse sectors are increasingly leveraging the cloud's inherent scalability and cost-efficiency to drive innovation and streamline operations.

  • 4 weeks ago | kbi.media | Scott Hesford

    Countering Pockets of Resistance to Cybersecurity Action Cybersecurity is commonly considered to involve users or people as a key part of the problem, and more than that, it’s an ‘everyone’ problem. Everyone has both a stake and role to play in securing an organisation, having mindset and awareness, and reflecting those in their actions and behaviours.

  • Dec 15, 2024 | kbi.media | Scott Hesford

    As cybersecurity threats become more sophisticated, businesses find themselves facing attackers who exploit increasingly complex identity trusts. The proliferation of digital transformation, accelerated by cloud adoption and remote work trends, has expanded organisational attack surfaces and complicated cybersecurity efforts. Today, identity-based attacks are so prevalent that roughly 90%[1] of organisations have experienced a breach linked to compromised identities during the past year.

  • Nov 21, 2024 | securitybrief.asia | Scott Hesford

    Data breaches and cyberattacks are a constant threat in today's digital world. At the same time, organisations of all sizes grapple with a silent security threat known as privilege creep. Privilege creep, also called permission sprawl or access creep, describes employees' unintended accumulation of access rights beyond what's necessary for their current job duties. This typically occurs when employees change roles or departments.

  • Sep 24, 2024 | frontier-enterprise.com | Scott Hesford

    - Advertisement -During the past few years, identity has become the most common attack vector for threat actors. This is because it is easier for a cybercriminal to log into a system than to hack their way in. Threat actors essentially need two things to penetrate an organisation: an identity and a means of accessing it, and there are numerous ways they can obtain that access. Identity-based attacks are becoming both more sophisticated and more frequent.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →