Stories by Scott Hesford
![Story image](../../../../../uploads/story/2024/11/22/preview_beyondtrust1.webp)
Effective ways to improve security by avoiding privilege creep
Fri, 22nd Nov 2024
#
firewalls
#
network security
#
mfa
In a digital landscape fraught with data breaches, organisations must tackle the silent threat of privilege creep to safeguard sensitive information.
![Story image](../../../../../uploads/story/2024/05/14/preview_Scott_Hesford_2.webp)
How your organisation can get exception handling of one-off requests right
Tue, 14th May 2024
#
datacentre infrastructure
#
application security
#
cybersecurity
When users encounter allowlisting restrictions, it matters how these are handled—in the backend for maintaining security posture and in the front end for user experience.
![Story image](../../../../../uploads/story/2023/12/06/preview_Scott_Hesford_BeyondTrust.webp)
Aussie firms must contextualize rising cyber incident data
Wed, 6th Dec 2023
#
ransomware
#
pam
#
mfa
Compromised credentials are at the root of most cyber incidents in Australia, yet you could be forgiven for thinking ransomware is still the greatest single threat.
![Story image](../../../../../uploads/story/2023/07/26/preview_Scott_Hesford_BeyondTrust.webp)
The three-stage path to a more secure IT environment
Wed, 26th Jul 2023
#
firewalls
#
network infrastructure
#
network security
Organisations in Australia and New Zealand are adopting a graduated approach to privileged access management to enhance security.
![Story image](../../../../../uploads/story/2022/08/17/preview_compatible_Scott_Hesford_BeyondTrust.webp)
‘Windows shops’ target admin rights to de-risk their environments
Wed, 17th Aug 2022
#
cybersecurity
#
windows
#
users
New data shows up to 75% of critical vulnerabilities could be mitigated through a rights and privileges crackdown.