Device Hardening Blog
Read the latest news, developments and opinion pieces on device hardening from industry experts New Net Technologies.
Details emerged this week on two major processor security flaws, leaving firms scrambling to issue fixes and secure machines for customers.
An unprotected MongoDB database containing the personal details on every voter in the state of California has been stolen and held for ransom after being exposed to the public facing internet.
Three men pleaded guilty yesterday to creating the infamous Mirai botnet, which is responsible for knocking offline some of the world’s most popular websites late last year.
Organizations during the third quarter experienced on average 237 DDoS attack attempts each month, equivalent to eight DDoS attack attempts each day.
Equifax, the credit agency guilty of poorly handling the private financial data of over 143 million consumers, has seen a 27 percent decrease in profits following the September hack.
A bipartisan legislation has been introduced that’s designed to protect the US voting systems infrastructure from foreign interference.
Two websites used to present the Czech Republic’s parliamentary election results were knocked offline after a DDoS attack last Saturday afternoon.
A massive new botnet has been found to be infecting poorly secured Internet of Things (IoT) devices, including IP wireless cameras.
As tools for conducting cyber attacks proliferate worldwide, large-scale cyber-attacks are becoming increasingly commonplace across the globe. But studies show that many organizations are still struggling to comprehend and manage the evolving cyber threats in our increasingly complex digital world.
Accenture has reported leaked information on at least four cloud-based Amazon S3 storage servers.
Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!
Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.
Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.