IT Security and Compliance Blog
Read the latest news, developments and opinion pieces on IT security and compliance from industry experts New Net Technologies.
Oracle and KPMG recently issued their 2020 Cloud Threat Report that identifies the key security risks and challenges organizations are faced with as they implement and manage cloud solutions.
The traditional approach to security is desperately flawed. NNT’s SecureOps strategy is a progressive way to deal with solving the problem of cybersecurity by combining the essential prescribed security controls recommended by frameworks such as NIST and the Center for Internet Security (CIS) with advanced threat prevention and detection, closed-loop intelligent change control and continuous compliance monitoring technology.
DevOps and traditional security have historically operated with different schools of thought. In the past, security was seen as a hindrance to the DevOps process and the role of security was left to address at the end of an applications life cycle.
Over the past five years, data breaches caused by third-party vendors have continued to increase in severity and frequency.
Starting on September 1, 2020, Department of Defense (DoD) contractors will be required to comply with the new Cybersecurity Maturity Model Certification (CMMC), a new cybersecurity framework designed to enhance security defenses.
Reducing your attack surface requires a robust vulnerability management solution to help combat today’s most persistent and devastating cyber threats.
Cyber Essentials and Cyber Essentials Plus are UK government-backed schemes that are designed to help protect organizations against 80 percent of most common cyber-attacks.
The coronavirus outbreak has become a real global pandemic affecting hundreds of millions of individuals and organizations across the world. Many governments have advised residents to avoid non-essential social contact and travel, a concept recently coined ‘social distancing’.
As the cybersecurity landscape evolves rapidly, organizations are working harder than ever to navigate security threats without interrupting business growth and innovation. However, cyber threats, by definition, are unrelentingly chaotic.
In recent years, with the rapid rise of cloud computing, the virtualization of applications and infrastructure has been replacing traditional in-house deployments of applications and services.