Device Hardening Blog
Read the latest news, developments and opinion pieces on device hardening from industry experts New Net Technologies.
Consumer Reports, a nonprofit organization that conducts non-biased and extensive reviews on cars, appliances, and other consumer goods, is preparing for the inclusion of cybersecurity and privacy safeguards when scoring products.
Romantik Seehotel Jägerwirt, a luxury lakeside hotel in the Austrian Alps, experienced a ransomware attack last week that was said to have left hotel guests locked in their bedrooms until the ransom was paid.
Researchers have confirmed that a Russian hacker successfully broke into the U.S. Election Assistance Commission (EAC) systems.
Last Friday, a massive distributed denial of service (DDoS) attack took down a number of vastly popular websites including Twitter, Spotify, and PayPal.
Medical device manufacturer St. Jude Medical was recently slammed by MedSec, a security startup specializing in medical devices, for selling products plagued with serious vulnerabilities.
According to the Ponemon Institute’s latest report, cloud adoption is rapidly growing, but companies are not taking security as seriously as they should be.
While organizations often acknowledge the need to implement solutions for the protection and management of privileged account credentials, a recent study found that very little are actually taking the necessary steps in employing best security practices.
TalkTalk has experienced profit losses of nearly fifty percent over the past year, due in part to the steep cost of several data breaches they experienced in just one years’ time.
The package delivery company, FedEx, has been the recent target of a phishing scam targeting English and Italian speaking customers.
The world's biggest maker of routers, Cisco, has suffered a huge cyber-attack following a breach in core devices which are used to route traffic around the Internet.
Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!
Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.
Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.