Device Hardening Blog
Read the latest news, developments and opinion pieces on device hardening from industry experts New Net Technologies.
The CSO and CIO of credit reporting agency Equifax have announced their retirements following one of the largest breaches of consumer private financial data in history, impacting 143 million US and 400,000 British customers.
New reports have found that hackers were able to exploit a security vulnerability at Equifax 2 months after an industry group discovered the coding flaw and offered a solution for it, leaving many to wonder why Equifax didn’t upgrade its software correctly when the flaw was originally found.
Are IoT (Internet of Things) devices security time bombs waiting to explode, or just benign and hugely-beneficial technological advances? As ever, the truth is somewhere in between, but there is a very simple test you can apply to assess which end of the spectrum a device sits at: ‘It depends’.
The NHS has suffered yet another cyber security incident, this time involving the confidential records on up to 1.2 million patients.
According to the cloud delivery provider Akamai, DDoS attacks spiked in the Q2 for the first time in nearly a year.
Four U.S. Senators have introduced a bipartisan bill aimed at improving the baseline security for all IoT devices bought and used by the U.S. government.
Hackers have leaked the alleged script for next week’s Game of Thrones episode after a hacking group breached the servers of HBO.
University College London (UCL) announced yesterday evening that they had been hit by a major ransomware attack, forcing the university to block access to shared devices.
Around 17 million users of the popular restaurant search platform Zomato have had their login credentials stolen by hackers and put on the dark web to be sold to criminals.
According to security researchers with IOActive and Quarkslab, the popular confidential messaging app called Confide is riddled with security vulnerabilities.
Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!
Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.
Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.