Device Hardening Blog
Read the latest news, developments and opinion pieces on device hardening from industry experts New Net Technologies.
The Carphone Warehouse cyber-attack has shown the potential cost of a cyber-attack.
French broadcaster TV5Monde is still without Internet and other key IT functions three months after a nation-state hacker took control of its TV channels and hijacked social media accounts. Meanwhile, the data breach costs are mounting up.
Mozilla has blocked all versions of Flash in its Firefox browser due to major security concerns with the software that have come to light after the attack on surveillance software firm Hacking Team.
Apple users are facing serious zero-days that could lay open all of their app credentials to attackers, on both Macs and iPhone/iPads.
A cool thing to use and admire, but based on sobering data: a graphical bubble chart representation of the world's largest reported data security breaches since 2004.
A total of 23,095 DDoS attacks were carried out on web resources located in 76 countries in the first quarter of 2015, up 15 percent from the 66 countries affected in the final quarter of last year.
The directors of Bettys & Taylors of Harrogate have pledged to harden cyber security on the Bettys.co.uk website and keep customers informed after details of 122,000 customers were lost in a data breach.
New research suggests that the rapid digitization of consumer's lives, combined with increasing cyber-crime activity, will push data breach losses up to US$ 2.1 trillion (£1.34 trillion) globally by 2019.
A targeted attack campaign that is believed to be state sponsored and uses Adobe and Windows zero-day vulnerabilities to infect victims' systems has been uncovered by researchers at FireEye.
Earlier this month BlueCoat and Experian released independent reports which painted a bleak picture of UK firms' information security practices, finding in particular that companies didn't have appropriate incident response plans, or carry out appropriate risk and security assessments.
Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!
Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.
Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.