Change & Configuration Management Blog
Read the latest news, developments and opinion pieces on configuration management from industry experts New Net Technologies.
Click on a link below to find out how a layered security approach can improve and speed up your configuration management and protect your files from unauthorized access and changes.
As demand for IoT devices increases, the issue of network security has become increasingly important, with more businesses and regular households moving everyday tasks and processes to the network and into the cloud.
The UK Information Commissions Office (ICO) has reported a 17% increase in data security incidents between the last three months of 2017 and the first quarter of 2018.
The latest research from the Ponemon Institute found that businesses are still struggling to create a mitigation strategy to efficiently detect, identify and manage insider threats.
Verizon’s recent 2018 Breach Investigations Report emphasizes that everyone has a role in managing security risks, but to best mitigate these threats you need to understand what you’re up against.
The latest research from Indegy found that nearly 60% of executives at critical infrastructure operators polled in a recent survey claim they lack the necessary security controls to protect their environment from potentially devastating security threats.
According to new research from UK business ISP, Beaming, UK firms were hit by over 230,000 cyber-attacks each in 2017.
According to researchers at AV-TEST, while the number of malware samples found decreased last year compared to 2015, those threats were more sophisticated than found before.
Security researchers at Rapid7 issued a patch on Wednesday for a critical vulnerability found in the popular networking software, Samba.
Scottrade Bank was recently under fire after a security researcher found a 60GB MSSQL database containing sensitive information on at least 20,000 customers exposed to the public online.
Barts Health was forced to take key IT systems offline on Friday after being hit by a cyber-attack.
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.