File Integrity Monitoring Blog
Read the latest news, developments and opinion pieces on IT security and compliance from industry experts New Net Technologies.
The ways in which File Integrity Monitoring can strengthen your security are threefold – through system hardening, malware protection, and change management. Click on a link below to find out more about how firewalls, servers, databases, servers and anti-virus programs can protect your IT systems.
One of the biggest breaches to hit Indian has leaked as many as 3.2 million payment card details, leaving financial institutions scrambling as they try to pick up the pieces.
As the FBI continues to work tirelessly in an effort to fight the latest ransomware epidemic, they’re now calling on victims of ransomware attacks to come forward promptly and share the details of their story.
According to the hotel operator, HEI Hotels & Resorts, hotels in 10 states and in the District of Columbia may have been targeted by hackers for months.
A report recently published by the Ponemon Institute found that three out of four organizations have been hit by data loss or theft over the past two years.
Shortly after Michael Phelps added a 19th gold medal to his collection, hackers began to target him.
The latest breach of an offshore account owned by Union Bank of India is raising new questions about the security of interbank payments, which fraudsters have been seen to easily compromise due to outdated backend authentication methods.
A U.S. Federal court ruled in favor of Microsoft in a privacy case involving whether the government can request access to information stored on servers outside the United States.
Pokémon Go, the new GPS-based augmented reality OS and Android mobile gaming app, has been causing a riff amongst the cyber community, leaving many concerned about the privacy risks and cyber threats associated with this new application.
Ransomware attacks may be the latest craze, but security professionals are more concerned about next year’s major threat- ransom-driven DDoS attacks.
The FBI has recently published a PSA that claims over 22,000 victims and nearly $3.1 billion in losses have been reported from October 2013 to May 2016.
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.