Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

NNT

Misconfiguration: Lessons Learned from the #1 Cause of Breaches in the Cloud

Did you know that 80% of companies have suffered a cloud-related breach caused by misconfiguration according to research by IDC? Watch our latest webinar on-demand to learn about the most common configuration mistakes which have led to major data breaches; and why continuous monitoring via Security Configuration Management (SCM) tools are critical to help prevent and quickly identify a breach. Watch now to learn.

Before you chew through Compliance, consider trying the CIS Controls

Have you heard of the CIS Controls? Even though they’re not part of any specified GRC (Governance, Risk Management, Compliance) mandate, they could actually be used as the foundation for them all. A light, straightforward hors d’oeuvre before you take on the mega-calorific, piled-high, full-fat platters of the multi-course feast that is a full Compliance standard.

When Old News is More Dangerous than Fake News: Vulnerability Scan Blind Spots

Out of all the cat videos you could watch, how do you decide which one to view first? The beauty of social media is its real-time, democratic operation. Everyone gets to vote and the content with the most shares is the People’s Choice, rightfully ‘The Best’. But we now know this Facebook-era notion of ‘most popular equals best’ is open to abuse. It turns out that a significant proportion of social media interaction is in fact, manufactured.

5 Key Processes & Controls to Maximize Cybersecurity Effectiveness

As of late, cybersecurity has come to the forefront of the I.T. Industry, and is one of the key functions of any organization. This article will discuss 5 key processes and potential controls you should implement in order to maximize the effectiveness of your cybersecurity efforts, leading to an all-around secure environment.

Change Management's 'Dirty Little Secret'

Change Management is blind. It is a key IT Service Management process and, undeniably, it's beneficial to plan and schedule changes. But Change Management’s ‘dirty little secret’ is that, despite the comfort blanket of documentation and approvals, you never know what’s really going on. You have no idea what was actually changed, either during the Change Window or at any other time.

Securing Digital Transformation in the New Normal

Last week, our team had the pleasure of hosting a virtual panel on securing digital transformation and what COVID-19 means for cyber security as we continue to navigate the increasingly remote workforce. Amid the COVID-19 pandemic, remote working has added a new dimension to the security, compliance, and digital transformation demand landscape.

NNT Change Tracker Gen7 R2 - Online Demo

NNT Change Tracker Gen 7 R2 provides critical and fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most comprehensive and intelligent change control solution available. Change Tracker from NNT will ensure that your IT systems remain in a known, secure and compliant state at all times.

NNT Log Tracker Enterprise - Online Demo

Comprehensive and easy-to-use Security Information and Event Management (SIEM) solution for any compliance mandate. Log Analysis or SIEM, is a key weapon in the fight against any cyber-attack. By gathering logs from all devices including network devices, Unix and Windows servers, applications and databases, and analyzing them for unusual or suspicious activity, the method and source of any attack can be identified, enabling preventative measures to be continually improved.