IT Security and Compliance Articles

Read articles from industry experts New Net Technologies to find out about best practices in keeping your IT systems secure.

Event Log, Audit Log and Syslog messages have always been a good source of troubleshooting and diagnostic information, but the need to back up audit trail files to a centralized log server is now a mandatory component of many governance standards.

If you haven’t yet been asked ‘The auditors want us to...’ or ‘The auditor suggested...’ or ‘...wants to know how we...’ the likelihood is, you will be soon!

A panel of experts comprising Adam Montville, David Froud and Mark Kedgley collaborated on a variety of cyber-security issues at a roundtable discussion.

The Center for Internet Security has embarked on a new branding effort to reflect the new services, features, and partnerships they’ll be introducing to meet the cybersecurity needs of both global public and private organizations.

The cloud has created a level of convenience and scalability that was unprecedented until just a few years ago. However, while cloud adoption has gained popularity over the last few years, security and compliance have historically been lacking in this field.

Organizations worldwide were hit with a rude awakening this year in terms of data protection. From medical providers, to financial institutions, and government agencies, hackers this year did not discriminate in terms of who’s the next organization to be breached. As we stand to enter the New Year, let’s reflect on some of the largest data breaches that occurred in 2016.  

Yahoo said on Wednesday it had discovered yet another major cyber-attack, with more than 1 billion user accounts said to have been comprised in August 2013, making this the largest data breach in history.

Following the Tesco Bank attack that left 9,000 Tesco customers with £2.5 million in fraudulent transactions, the UK banking sector enacted contingency plans that enable members to share critical intelligence information in hopes to prevent these kinds of attacks.

The U.S. Department of Defense announced on Monday that it has created a new Vulnerability Disclosure Program to help guide researchers on how to report security flaws found in the DoD’s public websites.

With the exception of Role-Based Access Control (RBAC), File Integrity Monitoring (FIM) is the only PCI requirement that achieves security in its purest form; prevention of, or alerts on, deviation from a known-good baseline.

Contact Us

USA Offices

New Net Technologies LLC
4850 Tamiami Trail, Suite 301
Naples, Florida, 34103

New Net Technologies LLC
1175 Peachtree St NE
Atlanta, Georgia, 30361.

Tel: (844) 898-8358
[email protected]

 

UK Office

New Net Technologies Ltd
The Russell Building, West Common
Harpenden, Hertfordshire
AL5 2JQ

Tel: 020 3917 4995
 [email protected]

SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Sans Institute Now Certified IBM Security
Copyright 2021, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.