Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

NNT

Change and Configuration Management Best Practices Guide

Systems are constantly changing. Change and configuration management best practices allow organizations to keep track of configuration changes in a way that allows for rapid feature updates without any service outages, but many organizations struggle to find the ideal formula to make this process successful. So, what are the best practices in change and configuration management?

Details of 142 Million MGM Hotel Guests Found on the Dark Web

The 2019 data breach at luxury hotel chain MGM Resorts appears to be much larger than originally reported after researchers recently found 142 million hotel guests’ personal details for sale on the dark web. Last summer’s data breach was initially reported to impact 10.6 million hotel guests after hackers were able to gain unauthorized access to a cloud server.

How to Move from Compliance to Risk-Based Security

As technology continues to evolve, so does the potential for cybersecurity risks, and just as the technology industry is showing no signs of slowing down development, neither are cybercriminals. Unfortunately for adopters of advanced technologies, the 2020 Thales Data Threat Report – Global Edition reveals that the more digitally transformed an organization is, the more likely the company is to be breached.

How to Detect Open Ports, Protocols and Services

IT Services rely on an individual port assigned to them in order to receive and transmit information, therefore, it’s imperative that an organization keeps track of what ports are open within their IT environment, the function of the port and what services it’s associated with. Detecting and disabling unwanted ports is part of an ongoing hardening process.

Cybersecurity Threats Facing the Technology Industry

As companies face increasingly sophisticated cyber threats, they often turn to technology solutions to help protect their data and systems from attacks. But what happens when your company is in the technology industry? Cyberattacks are increasingly targeting technology companies who often store and handle significant amounts of sensitive data, including personally identifiable information and intellectual property on behalf of their customers.