IT Security and Compliance Blog Archive
Read the news, developments and opinion pieces from years gone by about IT security and compliance from industry experts New Net Technologies.
As if the currently known and understood threats weren't enough to be worried about, in this article, TK Keanini on DarkReading.com has presented some hypothetical - but very tangible - future security nightmares.
A report released on Tuesday shows that the number of residents affected by data breaches in 2013 increased considerably compared to the previous year.
CSOOnline report that the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), a division of the U.S. Department of Homeland Security (ICS-CERT) issued an advisory on Tuesday warning that malware has been used since 2011 to attack a number of ICS (Industrial Control Systems).
Reports emerging today make great headlines even though the suggestion is that it was 'only' the unclassified network and no harm has been done. How do White House network user credentials get compromised in the first place?
"Drawing from the survey’s conclusions, PwC notes that it is critical for companies to focus on rapid detection of security intrusions and to have an effective, timely response"
PWC State of Information Security Survey 2015
As Thanksgiving approaches it serves as a reminder that this time last year, hackers were getting ready to invoke what turned out to be the most infamous security breach of 2013, resulting in the loss of over 40M payment card details from Target stores.
Great article from Brian Prince at Darkreading.com reveals a new level of commercialization within the hacker market. Now malvertising brokers are providing access to targeted victims on demand - for a price.
And now Brian Krebs is reporting that there is a suggestion that Staples Inc. is undertaking an investigation of a data breach relating to its northeastern US stores, in and around the New Jersey area.
They have now implemented measures so that they do have visibility of change activity at the POS, but what about the thousands of other retailers yet to take any action? Will they be a victim of a breach before they take action?
Read New Net Technologies CTO Mark Kedgley's opinion piece discussing why following the Target breach, companies processing payment cards must follow Best Practice steps to safeguard against security incidents.
Read New Net Technologies Mark Kedgley speak about starting up the businesses whilst located in a different country to his co-founder online at The Guardian.
SC Magazine reporting another Backoff Malware breach at another retailer, this time Dairy Queen.
The Snappening is happening and 13GB of Snapchat pictures have now been leaked on-line. The images appear to have been skimmed from the aligned, 3rd party website Snapsaved.com although investigations and denials are still being batted back and forth.
Confirmation via Krebs on Security that KMart has discovered card data-stealing malware on their Point of Sale hardware.
Read New Net Technologies CTO Mark Kedgley’s letter to the editor in the latest issue of Retail Systems.
Read New Net Technologies CTO Mark Kedgley’s latest article online at Pro Security Zone.
New Net Technologies is focusing on the Russian and CIS markets in a new distribution partnership set up with IT Guard.
Read the latest opinion piece from NNT, PCI inertia maintains high cyber risk for retailers.
NNT becoming an OVAL Adopter now means Change Tracker Enterprise V6.5 can not only use OVAL checklists to run Compliance Reports and score a device for compliance but that a monitoring Template can also be generated to provide continuous compliance monitoring.
New Net Technologies Change Tracker Enterprise Review on SC Magazine