Change & Configuration Management Blog
Read the latest news, developments and opinion pieces on configuration management from industry experts New Net Technologies.
Click on a link below to find out how a layered security approach can improve and speed up your configuration management and protect your files from unauthorized access and changes.
According to researchers at AV-TEST, while the number of malware samples found decreased last year compared to 2015, those threats were more sophisticated than found before.
Security researchers at Rapid7 issued a patch on Wednesday for a critical vulnerability found in the popular networking software, Samba.
Scottrade Bank was recently under fire after a security researcher found a 60GB MSSQL database containing sensitive information on at least 20,000 customers exposed to the public online.
Barts Health was forced to take key IT systems offline on Friday after being hit by a cyber-attack.
While corporations and major enterprises are often the primary targets for hackers, small and medium-sized businesses (SMES) need not forget that they could soon next.
The United States Internal Revenue Service announced Tuesday, February 9 that they have been hacked, again.
The tax software manufacturer, Tax Act, has just informed some of its customers that an unauthorized third party accessed their TaxAct account in late 2015.
A recent study conducted by Spiceworks has found that IT professionals feel responsible for the security of their organization's data.
With the end of the year approaching rapidly and 2016 right around the corner, it’s important to understand what cyber threats are upon us.
Despite recent requirements of the Payment Card Industry Security Standard (PCI DSS) and enhancements in security technologies, there are still gaps in the overall security of Point-of-Sale (POS) systems.