Dec 10, 2020   |  By Dirk Schrader
Specialty networking solutions provider, Belden, owners of specialist cyber security vendor Tripwire, recently disclosed a data breach resulting in the theft of employee and business information. Belden said in a press release that the security incident took place after hackers gained access to a “limited number” of its file servers. The intrusion was spotted after IT personnel detected unusual activity on some of its servers.
Nov 16, 2020   |  By Mark Kedgley
Have you heard of the CIS Controls? Even though they’re not part of any specified GRC (Governance, Risk Management, Compliance) mandate, they could actually be used as the foundation for them all. A light, straightforward hors d’oeuvre before you take on the mega-calorific, piled-high, full-fat platters of the multi-course feast that is a full Compliance standard.
Oct 21, 2020   |  By Mark Kedgley
Out of all the cat videos you could watch, how do you decide which one to view first? The beauty of social media is its real-time, democratic operation. Everyone gets to vote and the content with the most shares is the People’s Choice, rightfully ‘The Best’. But we now know this Facebook-era notion of ‘most popular equals best’ is open to abuse. It turns out that a significant proportion of social media interaction is in fact, manufactured.
Oct 13, 2020   |  By Spartak Goskolli
As of late, cybersecurity has come to the forefront of the I.T. Industry, and is one of the key functions of any organization. This article will discuss 5 key processes and potential controls you should implement in order to maximize the effectiveness of your cybersecurity efforts, leading to an all-around secure environment.
Oct 8, 2020   |  By Mark Kedgley
Change Management is blind. It is a key IT Service Management process and, undeniably, it's beneficial to plan and schedule changes. But Change Management’s ‘dirty little secret’ is that, despite the comfort blanket of documentation and approvals, you never know what’s really going on. You have no idea what was actually changed, either during the Change Window or at any other time.
Sep 30, 2020   |  By Mark Kedgley
If you think you’re having a bad day, you should see what happened to a group of Greek merchants crossing the Black Sea, 2,400 years ago. Providing a stark perspective on the vastness of history, their ship has just been discovered under 2km of water.
Sep 21, 2020   |  By Mark Kedgley
Last week, our team had the pleasure of hosting a virtual panel on securing digital transformation and what COVID-19 means for cyber security as we continue to navigate the increasingly remote workforce. Amid the COVID-19 pandemic, remote working has added a new dimension to the security, compliance, and digital transformation demand landscape.
Sep 14, 2020   |  By Morgan Reed
Security researchers recently discovered six critical vulnerabilities in third-party code that could expose hundreds of thousands of OT environments to remote code execution attacks. These vulnerabilities were found in Wibu-Systems’ CodeMeter software, a license management platform that is used widely by some of today’s leading industrial control system (ICS) product vendors, include Rockwell Automation and Siemens.
Sep 10, 2020   |  By Gene Atwood
Safeguarding against insider dangers in cybersecurity is among the leading issues that organizations are encountering today. Whether that risk results from ignorance, oversight or is made with harmful intent, utilizing these techniques will significantly help secure your organization. When people think of insider threats, their minds typically go to rogue or disgruntled employees that are intentionally performing a malicious act.
Sep 3, 2020   |  By Mark Kerrison
The traditional approach to security is desperately flawed. NNT’s SecureOps strategy is a progressive way to deal with solving the problem of cybersecurity by combining the essential prescribed security controls recommended by frameworks such as NIST and the Center for Internet Security (CIS) with advanced threat prevention and detection, closed-loop intelligent change control and continuous compliance monitoring technology.
Jan 6, 2021   |  By New Net Technologies
Audit, configure and secure your entire network with SecureOps Watch this brief on-demand demo to see how you can get started in securing your IT environment with industry-approved foundational controls, intelligent change control and automation.
Dec 3, 2020   |  By New Net Technologies
Did you know that 80% of companies have suffered a cloud-related breach caused by misconfiguration according to research by IDC? Watch our latest webinar on-demand to learn about the most common configuration mistakes which have led to major data breaches; and why continuous monitoring via Security Configuration Management (SCM) tools are critical to help prevent and quickly identify a breach. Watch now to learn.
Sep 18, 2020   |  By New Net Technologies
NNT Change Tracker Gen 7 R2 provides critical and fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most comprehensive and intelligent change control solution available. Change Tracker from NNT will ensure that your IT systems remain in a known, secure and compliant state at all times.
Sep 17, 2020   |  By New Net Technologies
Comprehensive and easy-to-use Security Information and Event Management (SIEM) solution for any compliance mandate. Log Analysis or SIEM, is a key weapon in the fight against any cyber-attack. By gathering logs from all devices including network devices, Unix and Windows servers, applications and databases, and analyzing them for unusual or suspicious activity, the method and source of any attack can be identified, enabling preventative measures to be continually improved.
Sep 17, 2020   |  By New Net Technologies
Vulnerability scanning is an essential foundational security control and vital for every organization. Cyber attacks such as WannaCry and Petya, left many asking the question: How can we stay safely ahead of the next threat? Using NNT Vulnerability Tracker™ will ensure that any known vulnerabilities can be identified within your IT infrastructure before they are exploited.
Sep 14, 2020   |  By New Net Technologies
Being the victim of a cyber-attack can be scary, expensive and potentially business-crippling. Gold Build Standard? Corporate Build / Hardened Build? Controlled Image? Baseline Configuration? You’ll find the need for a Gold Build Standard in all compliance frameworks
Sep 10, 2020   |  By New Net Technologies
As an IT security leader, how are you adapting during these uncertain times? Amid the COVID-19 pandemic, remote working has added a new dimension to the security, compliance and digital transformation demand landscape. It is increasingly important to embed security solutions and processes into the organization that reduce complexity and massively increase the automation of killer manual tasks. Learn how C-Level and other senior leaders from around the globe are securing digital transformation in the new normal by watching our latest CISO Panel.
May 15, 2020   |  By New Net Technologies
Just how effectively does your organization operate the first six CIS Controls? If 90% of cyber attacks can be prevented by mastering the first 6 controls, why hasn’t everyone already embraced them?
Feb 26, 2020   |  By New Net Technologies
Mark Kerrison, NNT CEO, and Mark Kedgley, NNT CTO, talk about SecureOps and why it is a genuinely effective strategy for cyber security.
Jan 21, 2019   |  By New Net Technologies
Given the latest WannaCry Ransomware epidemic, which infected more than 230,000 users in over 150 countries, it’s vitally important that organizations fully understand the risks associated with using out-of-date systems and software.
Jan 1, 2019   |  By New Net Technologies
Without our help, controlling changes can be one of the biggest challenges facing multi-functional IT Teams. The size of task, process, and coordination of effort often means that changes continue to occur outside of any planned change approvals and the IT team is unable to prevent this from continuing. The solution? NNT’s Managed Change Control Program.
Dec 1, 2018   |  By New Net Technologies
In early 2017, NNT assembled a panel of experts to discuss the increased importance of applying the Center for Internet Security Controls as part of a modern approach to cyber security. The session also highlighted the benefits of combining the CIS Controls with ongoing, real-time compliance monitoring.
Nov 1, 2018   |  By New Net Technologies
Some of us will need therapy during and after an audit - that’s not unusual - but can a Compliance Audit really bring about the same feelings as other forms of grief? Furthermore, if this really is the case then, by extension, could we coach ourselves through the compliance audit process to become more effective at dealing with future audit situations?
Oct 1, 2018   |  By New Net Technologies
Right now, Ransomware is the Great White Shark of cyber-attacks, the most feared malware of all, and both corporate and home users are running scared. And rightly so - Anyone who has had experience with Ransomware, will attest to the agony and disruption. But instead of worrying about an attack, what action can be taken to safely venture back into the water and not necessarily “with a bigger Boat”?
Sep 1, 2018   |  By New Net Technologies
By combining Threat Intelligence with FIM, a knowledgebase of ‘known safe’ files can be leveraged to improve the accuracy and speed of change review.
Aug 1, 2018   |  By New Net Technologies
Our medical, health and personal information should remain private. While the principle of Doctor-Patient confidentiality has always been regarded as sacrosanct, the electronic age has inevitably led to greater ease of access to all information, including confidential patient details a.k.a. electronic protected health information.
Jul 1, 2018   |  By New Net Technologies
Vulnerability management is a key security best-practice that serves to prevent the complete spectrum of cyber-attacks. But how do you strike the right balance between maintaining the security of an IT environment that never stands still, and maximizing system performance, uptime and service delivery?

New Net Technologies (NNT) is the leading provider of Security through System Integrity focused on helping organizations reduce their security risk, increase service availability and achieving continuous compliance.

NNT delivers Security through System Integrity by introducing the essential Critical Security Controls, leveraging intelligent change control technology to track system integrity, and using dynamic policy and baseline management to ensure systems remain secure, available and compliant at all times.

Our Trusted Security Portfolio:

  • Change Tracker™ Gen7 R2 Combine industry leading Device Hardening, File Integrity Monitoring, Change & Configuration Management, Security & Compliance Management into one easy to use solution!
  • NNT FAST™ (File Approved-Safe technology) Cloud Automatically evaluate file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Threat Intelligence.
  • NNT Log Tracker Enterprise™ Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

Security through System Integrity: Made possible only with NNT.