IT Security and Compliance Blog
Read the latest news, developments and opinion pieces on IT security and compliance from industry experts New Net Technologies.
Specialty networking solutions provider, Belden, owners of specialist cyber security vendor Tripwire, recently disclosed a data breach resulting in the theft of employee and business information.
Have you heard of the CIS Controls? Even though they’re not part of any specified GRC (Governance, Risk Management, Compliance) mandate, they could actually be used as the foundation for them all.
Out of all the cat videos you could watch, how do you decide which one to view first? The beauty of social media is its real-time, democratic operation. Everyone gets to vote and the content with the most shares is the People’s Choice, rightfully ‘The Best’. But we now know this Facebook-era notion of ‘most popular equals best’ is open to abuse.
As of late, cybersecurity has come to the forefront of the I.T. Industry, and is one of the key functions of any organization. This article will discuss 5 key processes and potential controls you should implement in order to maximize the effectiveness of your cybersecurity efforts, leading to an all-around secure environment.
If you think you’re having a bad day, you should see what happened to a group of Greek merchants crossing the Black Sea, 2,400 years ago. Providing a stark perspective on the vastness of history, their ship has just been discovered under 2km of water.
Last week, our team had the pleasure of hosting a virtual panel on securing digital transformation and what COVID-19 means for cyber security as we continue to navigate the increasingly remote workforce.
Security researchers recently discovered six critical vulnerabilities in third-party code that could expose hundreds of thousands of OT environments to remote code execution attacks.
Safeguarding against insider dangers in cybersecurity is among the leading issues that organizations are encountering today. Whether that risk results from ignorance, oversight or is made with harmful intent, utilizing these techniques will significantly help secure your organization.
Data breaches are a common occurrence in the world we live in today. Whether its personal data that relates to an organizations’ customers or data referencing the inner workings of an organization’s infrastructure, when it falls into the wrong hands, the consequences are disastrous.
There are two things that you might consider when selecting a File Integrity Monitoring (FIM) and Change Control solution. 1. Depth of useable features such as efficiency in suppressing change noise and 2. Brand recognition.