Breach Detection Blog
Read the latest news, developments and opinion pieces on IT security and compliance from industry experts New Net Technologies.
Click on a link below to find out how a layered security approach can improve and speed up your breach detection and protect your files from unauthorized access and changes.
In the cybersecurity world, testing for the existence of exploitable vulnerabilities isn’t always an exact science. Checking for open ports (CIS Control 9 - Limitation and Control of Network Ports, Protocols and Services) sounds simple enough, but the reality is a long way off.
In the cybersecurity world, testing for the existence of exploitable vulnerabilities isn’t always an exact science.
Global hotel chain Marriott has revealed that it suffered a significant data breach with the data of 500 million customers possibly compromised by attackers.
The FBI & DHS issued a joint statement alerting businesses and consumers that cybercriminals are increasingly exploiting the Remote Desktop Protocol (RDP) administration tool.
Sometimes you can’t win. Patching, and the right time and process for doing so, is very much a case in point.
Today, Facebook will begin notifying the eighty-seven million Facebook users whose details were shared with Cambridge Analytica in one of the social network’s largest data breaches to date.
Under Armour revealed details last week into the biggest breach of 2018, impacting over 150 million of its MyFitnessPal health and wellness users.
New research from Verizon proves the healthcare industry is still several steps behind other industries in being able to protect patient healthcare information.
The U.S. Securities and Exchange Commission issued new guidance calling on public companies to be more forthcoming when disclosing cyber security risks within their organization, even before a breach or cyber-attack occurs.
The city of Allentown, Pennsylvania is struggling to remediate a recent malware attack that’s said to cost the city nearly $1 million to mitigate.
Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!
Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.
Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.