CFOtech Australia - Technology news for CFOs & financial decision-makers

Steve Hunter stories

Steve Hunter is an insightful author focused on the complexities of operational technology (OT) and IoT security in today's rapidly changing digital landscape. His recent works provide valuable guidance for organizations seeking to enhance their security strategies in an era marked by increasing vulnerabilities and advanced threats.

Through his articles, readers can gain a deeper understanding of essential practices for future-proofing security strategies. Hunter's advice on adopting a zero trust approach reveals the critical mindset shift organizations need to make in order to effectively protect their assets and operations, especially in a world where remote work has become commonplace.

By examining the latest findings and vulnerabilities, such as AMNESIA:33, Hunter highlights the importance of staying informed about emerging threats. His discussions on asset management also emphasize the crucial questions organizations must consider to ensure they select solutions that align with their long-term cybersecurity goals.

Ultimately, readers can learn practical insights and strategies from Steve Hunter's work that are essential for navigating the challenges of IoT and OT security. His articles encourage a proactive approach to cybersecurity, ensuring organizations not only respond to current challenges but also prepare for the future.

Gettyimages 859640008

New edge vulnerability revealed by Forescout

Wed, 9th Dec 2020
AMNESIA:33 is a set of 33 memory-corrupting vulnerabilities affecting four open source TCP/IP stacks: uIP; FNET; picoTCP; and Nut/Net.
Identity and access management3

Why zero trust could fail due to lack of understanding​, not technology

Tue, 20th Oct 2020
Distributed workforces are becoming the norm, but implementing a zero trust security model requires understanding and knowledge.
Cybersecurity22

The five business benefits of a zero trust approach to security

Wed, 19th Aug 2020
Zero trust security offers businesses improved visibility, cost reduction, simplified compliance, cohesive IT resolutions, and seamless digital transformation.
Gettyimages 1166419440

Four tips for organisations to help future-proof their OT security strategy

Tue, 19th May 2020
As the OT security market rapidly evolves, businesses must adapt their strategies. Forescout offers four essential tips for future-proofing OT security.
Gettyimages 1169668297

Embracing zero trust for IoT and OT: a fundamental mind shift

Thu, 23rd Apr 2020
Remote working has become common practice, but it brings new security challenges. Forescout outlines four considerations for a zero trust architecture.
Gettyimages 1151198180

Five questions organisations should ask when evaluating an asset management solution

Wed, 25th Mar 2020
As asset management remains key to cybersecurity, businesses must ask the right questions to choose a solution that fits their unique needs and long-term goals.
Iot10

Key considerations for consistent IoT manageability and security

Mon, 20th Jan 2020
As IoT devices permeate all aspects of life, organisations must prioritise security and manageability to harness their benefits without escalating risks.
Cybersecurity7

Are organisations ready for Zero Trust?

Mon, 25th Nov 2019
Despite its clear benefits, very few organisations have turned the concept of Zero Trust into a security practice, Forescout finds.