NNT

Jul 7, 2020   |  By Pavel Palenzuela
Hardening operating systems and keeping an audit trail of activity using a change detection and SIEM solution are must haves in order to ensure that your environment is safe from cyber attacks or unwanted intrusions. Moreover, establishing a secure baseline is a great addition for protecting your systems from internal and external threats.
Jun 25, 2020   |  By Gene Atwood
Within the last decade or so, the advancement of distributed systems has introduced new complexities in managing your log data. Today’s systems can include Servers, Workstations, Firewalls, Databases etc., all with different Operating Systems and each generating their own log data.
Jun 23, 2020   |  By Mark Kedgley
This is it, the best ever PCI DSS and what is hoped will be the definitive version. Despite being a major version change, the 12 core requirements we know and love remain. But there are some significant changes planned. In headline terms, the update is determined to make the standard more flexible and more open to new technologies.
Jun 17, 2020   |  By Mark Kerrison
As technology continues to evolve, so does the potential for cybersecurity risks, and just as the technology industry is showing no signs of slowing down development, neither are cybercriminals. Unfortunately for adopters of advanced technologies, the 2020 Thales Data Threat Report – Global Edition reveals that the more digitally transformed an organization is, the more likely the company is to be breached.
Jun 15, 2020   |  By Spartak Goskolli
With the ever-changing landscape of IT Security, the war against cybercriminals continues to evolve on a day by day basis. Now more than ever before, organizations need to implement proper security controls and mechanisms to help defend against the evolving threat landscape.
Jan 21, 2019   |  By New Net Technologies
Given the latest WannaCry Ransomware epidemic, which infected more than 230,000 users in over 150 countries, it’s vitally important that organizations fully understand the risks associated with using out-of-date systems and software.
Jan 1, 2019   |  By New Net Technologies
Without our help, controlling changes can be one of the biggest challenges facing multi-functional IT Teams. The size of task, process, and coordination of effort often means that changes continue to occur outside of any planned change approvals and the IT team is unable to prevent this from continuing. The solution? NNT’s Managed Change Control Program.
Dec 1, 2018   |  By New Net Technologies
In early 2017, NNT assembled a panel of experts to discuss the increased importance of applying the Center for Internet Security Controls as part of a modern approach to cyber security. The session also highlighted the benefits of combining the CIS Controls with ongoing, real-time compliance monitoring.
Nov 1, 2018   |  By New Net Technologies
Some of us will need therapy during and after an audit - that’s not unusual - but can a Compliance Audit really bring about the same feelings as other forms of grief? Furthermore, if this really is the case then, by extension, could we coach ourselves through the compliance audit process to become more effective at dealing with future audit situations?
Oct 1, 2018   |  By New Net Technologies
Right now, Ransomware is the Great White Shark of cyber-attacks, the most feared malware of all, and both corporate and home users are running scared. And rightly so - Anyone who has had experience with Ransomware, will attest to the agony and disruption. But instead of worrying about an attack, what action can be taken to safely venture back into the water and not necessarily “with a bigger Boat”?
May 15, 2020   |  By New Net Technologies
Just how effectively does your organization operate the first six CIS Controls? If 90% of cyber attacks can be prevented by mastering the first 6 controls, why hasn’t everyone already embraced them?
Feb 26, 2020   |  By New Net Technologies
Mark Kerrison, NNT CEO, and Mark Kedgley, NNT CTO, talk about SecureOps and why it is a genuinely effective strategy for cyber security.
Dec 18, 2019   |  By New Net Technologies
Change Control is not the same as Change Management. While Change Management focuses on the justification and planning of any changes, Change Control majors on the verification and approval of actual changes made.
Nov 28, 2019   |  By New Net Technologies
What is a vulnerability scanner and how does it work?
Nov 14, 2019   |  By New Net Technologies
Guide to integrate NNT Change Tracker Gen 7 R2 with MicroFocus (HP) ArcSight Logger.