Sep 21, 2020   |  By Mark Kedgley
Last week, our team had the pleasure of hosting a virtual panel on securing digital transformation and what COVID-19 means for cyber security as we continue to navigate the increasingly remote workforce. Amid the COVID-19 pandemic, remote working has added a new dimension to the security, compliance, and digital transformation demand landscape.
Sep 14, 2020   |  By Morgan Reed
Security researchers recently discovered six critical vulnerabilities in third-party code that could expose hundreds of thousands of OT environments to remote code execution attacks. These vulnerabilities were found in Wibu-Systems’ CodeMeter software, a license management platform that is used widely by some of today’s leading industrial control system (ICS) product vendors, include Rockwell Automation and Siemens.
Sep 10, 2020   |  By Gene Atwood
Safeguarding against insider dangers in cybersecurity is among the leading issues that organizations are encountering today. Whether that risk results from ignorance, oversight or is made with harmful intent, utilizing these techniques will significantly help secure your organization. When people think of insider threats, their minds typically go to rogue or disgruntled employees that are intentionally performing a malicious act.
Sep 3, 2020   |  By Mark Kerrison
The traditional approach to security is desperately flawed. NNT’s SecureOps strategy is a progressive way to deal with solving the problem of cybersecurity by combining the essential prescribed security controls recommended by frameworks such as NIST and the Center for Internet Security (CIS) with advanced threat prevention and detection, closed-loop intelligent change control and continuous compliance monitoring technology.
Aug 19, 2020   |  By Ben Richmond
Data breaches are a common occurrence in the world we live in today. Whether its personal data that relates to an organizations’ customers or data referencing the inner workings of an organization’s infrastructure, when it falls into the wrong hands, the consequences are disastrous. It’s for that reason that organizations need to ensure that they have all of the necessary controls in place so that their data is safe and secure.
Aug 13, 2020   |  By Mark Kerrison
There are two things that you might consider when selecting a File Integrity Monitoring (FIM) and Change Control solution – 1) Depth of useable features such as efficiency in suppressing change noise and 2) Brand recognition. Some organizations might choose smart features such as powerful, closed-loop intelligent change control over the brand while some might focus on the brand name at the risk of not paying as much attention to the software’s really useful features and capabilities.
Aug 4, 2020   |  By Phill Harris
NNT Change Tracker is a world class solution for evaluating the security posture of your infrastructure. Whether you adhere to frameworks such as the Center for Internet Security, NIST or even if you have a home baked version of how best to harden your environment, Change Tracker will assess and report on how your deployed assets measure up against the standard.
Jul 28, 2020   |  By Morgan Reed
The finance industry has long been the ideal target for dangerous cyber criminals, holding a treasure trove of sensitive information and financial credentials of innocent victims, but in the wake of the post COVID-19 lockdown period, researchers have found that these institutions are seeing a marked spike in cyberattacks.
Jul 21, 2020   |  By Denis Goskolli
Systems are constantly changing. Change and configuration management best practices allow organizations to keep track of configuration changes in a way that allows for rapid feature updates without any service outages, but many organizations struggle to find the ideal formula to make this process successful. So, what are the best practices in change and configuration management?
Jul 15, 2020   |  By Morgan Reed
The 2019 data breach at luxury hotel chain MGM Resorts appears to be much larger than originally reported after researchers recently found 142 million hotel guests’ personal details for sale on the dark web. Last summer’s data breach was initially reported to impact 10.6 million hotel guests after hackers were able to gain unauthorized access to a cloud server.
Sep 18, 2020   |  By New Net Technologies
NNT Change Tracker Gen 7 R2 provides critical and fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most comprehensive and intelligent change control solution available. Change Tracker from NNT will ensure that your IT systems remain in a known, secure and compliant state at all times.
Sep 17, 2020   |  By New Net Technologies
Comprehensive and easy-to-use Security Information and Event Management (SIEM) solution for any compliance mandate. Log Analysis or SIEM, is a key weapon in the fight against any cyber-attack. By gathering logs from all devices including network devices, Unix and Windows servers, applications and databases, and analyzing them for unusual or suspicious activity, the method and source of any attack can be identified, enabling preventative measures to be continually improved.
Sep 17, 2020   |  By New Net Technologies
Vulnerability scanning is an essential foundational security control and vital for every organization. Cyber attacks such as WannaCry and Petya, left many asking the question: How can we stay safely ahead of the next threat? Using NNT Vulnerability Tracker™ will ensure that any known vulnerabilities can be identified within your IT infrastructure before they are exploited.
Sep 14, 2020   |  By New Net Technologies
Being the victim of a cyber-attack can be scary, expensive and potentially business-crippling. Gold Build Standard? Corporate Build / Hardened Build? Controlled Image? Baseline Configuration? You’ll find the need for a Gold Build Standard in all compliance frameworks
Sep 10, 2020   |  By New Net Technologies
As an IT security leader, how are you adapting during these uncertain times? Amid the COVID-19 pandemic, remote working has added a new dimension to the security, compliance and digital transformation demand landscape. It is increasingly important to embed security solutions and processes into the organization that reduce complexity and massively increase the automation of killer manual tasks. Learn how C-Level and other senior leaders from around the globe are securing digital transformation in the new normal by watching our latest CISO Panel.
May 15, 2020   |  By New Net Technologies
Just how effectively does your organization operate the first six CIS Controls? If 90% of cyber attacks can be prevented by mastering the first 6 controls, why hasn’t everyone already embraced them?
Feb 26, 2020   |  By New Net Technologies
Mark Kerrison, NNT CEO, and Mark Kedgley, NNT CTO, talk about SecureOps and why it is a genuinely effective strategy for cyber security.
Dec 18, 2019   |  By New Net Technologies
Change Control is not the same as Change Management. While Change Management focuses on the justification and planning of any changes, Change Control majors on the verification and approval of actual changes made.
Nov 28, 2019   |  By New Net Technologies
What is a vulnerability scanner and how does it work?
Nov 14, 2019   |  By New Net Technologies
Guide to integrate NNT Change Tracker Gen 7 R2 with MicroFocus (HP) ArcSight Logger.
Jan 21, 2019   |  By New Net Technologies
Given the latest WannaCry Ransomware epidemic, which infected more than 230,000 users in over 150 countries, it’s vitally important that organizations fully understand the risks associated with using out-of-date systems and software.
Jan 1, 2019   |  By New Net Technologies
Without our help, controlling changes can be one of the biggest challenges facing multi-functional IT Teams. The size of task, process, and coordination of effort often means that changes continue to occur outside of any planned change approvals and the IT team is unable to prevent this from continuing. The solution? NNT’s Managed Change Control Program.
Dec 1, 2018   |  By New Net Technologies
In early 2017, NNT assembled a panel of experts to discuss the increased importance of applying the Center for Internet Security Controls as part of a modern approach to cyber security. The session also highlighted the benefits of combining the CIS Controls with ongoing, real-time compliance monitoring.
Nov 1, 2018   |  By New Net Technologies
Some of us will need therapy during and after an audit - that’s not unusual - but can a Compliance Audit really bring about the same feelings as other forms of grief? Furthermore, if this really is the case then, by extension, could we coach ourselves through the compliance audit process to become more effective at dealing with future audit situations?
Oct 1, 2018   |  By New Net Technologies
Right now, Ransomware is the Great White Shark of cyber-attacks, the most feared malware of all, and both corporate and home users are running scared. And rightly so - Anyone who has had experience with Ransomware, will attest to the agony and disruption. But instead of worrying about an attack, what action can be taken to safely venture back into the water and not necessarily “with a bigger Boat”?
Sep 1, 2018   |  By New Net Technologies
By combining Threat Intelligence with FIM, a knowledgebase of ‘known safe’ files can be leveraged to improve the accuracy and speed of change review.
Aug 1, 2018   |  By New Net Technologies
Our medical, health and personal information should remain private. While the principle of Doctor-Patient confidentiality has always been regarded as sacrosanct, the electronic age has inevitably led to greater ease of access to all information, including confidential patient details a.k.a. electronic protected health information.
Jul 1, 2018   |  By New Net Technologies
Vulnerability management is a key security best-practice that serves to prevent the complete spectrum of cyber-attacks. But how do you strike the right balance between maintaining the security of an IT environment that never stands still, and maximizing system performance, uptime and service delivery?

New Net Technologies (NNT) is the leading provider of Security through System Integrity focused on helping organizations reduce their security risk, increase service availability and achieving continuous compliance.

NNT delivers Security through System Integrity by introducing the essential Critical Security Controls, leveraging intelligent change control technology to track system integrity, and using dynamic policy and baseline management to ensure systems remain secure, available and compliant at all times.

Our Trusted Security Portfolio:

  • Change Tracker™ Gen7 R2 Combine industry leading Device Hardening, File Integrity Monitoring, Change & Configuration Management, Security & Compliance Management into one easy to use solution!
  • NNT FAST™ (File Approved-Safe technology) Cloud Automatically evaluate file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Threat Intelligence.
  • NNT Log Tracker Enterprise™ Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

Security through System Integrity: Made possible only with NNT.