Naples, FL, USA
May 27, 2020 | By Ben Richmond
Configuration drift occurs when unrecorded or unplanned changes are made to a system, application or network. As a system drifts over time, away from the original intended state, the severity of the matter increases. Any user’s actions, however big or small, that result in a given configuration deviating away from one that is considered necessary or secure can have potentially severe consequences and detrimental effects on an organization.
May 21, 2020 | By Phill Harris
Oracle and KPMG recently issued their 2020 Cloud Threat Report that identifies the key security risks and challenges organizations are faced with as they implement and manage cloud solutions. The joint cloud and threat security report revealed a shift in attitudes towards cloud security, with 75% of respondents viewing the public cloud as more secure than their own data centers.
May 19, 2020 | By Phill Harris
DevOps and traditional security have historically operated with different schools of thought. In the past, security was seen as a hindrance to the DevOps process and the role of security was left to address at the end of an applications life cycle. But now, there’s a way to make security a part of your DevOps process without reducing speed or scalability – with the adoption of DevSecOps.
May 12, 2020 | By Mark Kerrison
Over the past five years, data breaches caused by third-party vendors have continued to increase in severity and frequency. In fact, research found in the latest Ponemon Institute Data Risk in the Third-Party Ecosystem report claims that 59% of companies experienced a data breach caused by one of their third-party vendors. Minimizing your chances of a third-party data breach is a tall order since much of it is out of your direct control.
What is the Cybersecurity Maturity Model Certification and What Can Your Organization do to Prepare?
May 7, 2020 | By Mark Kerrison
Starting on September 1, 2020, Department of Defense (DoD) contractors will be required to comply with the new Cybersecurity Maturity Model Certification (CMMC), a new cybersecurity framework designed to enhance security defenses. This new standard draws upon NIST 800-171 Rev 2, ISO 27001 and other security frameworks to create one unified standard for implementing cybersecurity across the entire defense industrial base (IDB).
Jan 21, 2019 | By New Net Technologies
Given the latest WannaCry Ransomware epidemic, which infected more than 230,000 users in over 150 countries, it’s vitally important that organizations fully understand the risks associated with using out-of-date systems and software.
Jan 1, 2019 | By New Net Technologies
Without our help, controlling changes can be one of the biggest challenges facing multi-functional IT Teams. The size of task, process, and coordination of effort often means that changes continue to occur outside of any planned change approvals and the IT team is unable to prevent this from continuing. The solution? NNT’s Managed Change Control Program.
Dec 1, 2018 | By New Net Technologies
In early 2017, NNT assembled a panel of experts to discuss the increased importance of applying the Center for Internet Security Controls as part of a modern approach to cyber security. The session also highlighted the benefits of combining the CIS Controls with ongoing, real-time compliance monitoring.
Nov 1, 2018 | By New Net Technologies
Some of us will need therapy during and after an audit - that’s not unusual - but can a Compliance Audit really bring about the same feelings as other forms of grief? Furthermore, if this really is the case then, by extension, could we coach ourselves through the compliance audit process to become more effective at dealing with future audit situations?
Oct 1, 2018 | By New Net Technologies
Right now, Ransomware is the Great White Shark of cyber-attacks, the most feared malware of all, and both corporate and home users are running scared. And rightly so - Anyone who has had experience with Ransomware, will attest to the agony and disruption. But instead of worrying about an attack, what action can be taken to safely venture back into the water and not necessarily “with a bigger Boat”?
May 15, 2020 | By New Net Technologies
Just how effectively does your organization operate the first six CIS Controls? If 90% of cyber attacks can be prevented by mastering the first 6 controls, why hasn’t everyone already embraced them?
- February 2017 (1)
- April 2017 (1)
- October 2017 (1)
- November 2017 (1)
- April 2018 (1)
- May 2018 (2)
- July 2018 (1)
- August 2018 (1)
- September 2018 (4)
- October 2018 (8)
- November 2018 (4)
- December 2018 (2)
- January 2019 (6)
- February 2019 (4)
- March 2019 (1)
- April 2019 (3)
- May 2019 (8)
- June 2019 (6)
- July 2019 (18)
- August 2019 (18)
- September 2019 (16)
- October 2019 (14)
- November 2019 (8)
- December 2019 (6)
- January 2020 (15)
- February 2020 (10)
- April 2020 (6)
- May 2020 (7)