Change & Configuration Management Blog
Read the latest news, developments and opinion pieces on configuration management from industry experts New Net Technologies.
Click on a link below to find out how a layered security approach can improve and speed up your configuration management and protect your files from unauthorized access and changes.
Change Management is blind. It is a key IT Service Management process and, undeniably, it's beneficial to plan and schedule changes. But Change Management’s ‘dirty little secret’ is that, despite the comfort blanket of documentation and approvals, you never know what’s really going on.
Airbus has revealed they recently experienced a cyber-attack that resulted in compromised employee information.
It was announced today that ride-sharing giant Uber will pay $148 million and tighten the company’s data security protections after failing to notify drivers that hackers had stolen their personal information.
Cyber thieves managed to walk away with $13.5 million (944 million rupees) from India’s Cosmos Bank after making illegal withdrawals at ATMs across 28 countries over the past weekend.
The UK government has launched a new cybersecurity standard designed to set a baseline of mandatory security outcomes for all departments with regards to protecting their information, technology, and digital services.
As demand for IoT devices increases, the issue of network security has become increasingly important, with more businesses and regular households moving everyday tasks and processes to the network and into the cloud.
The UK Information Commissions Office (ICO) has reported a 17% increase in data security incidents between the last three months of 2017 and the first quarter of 2018.
The latest research from the Ponemon Institute found that businesses are still struggling to create a mitigation strategy to efficiently detect, identify and manage insider threats.
Verizon’s recent 2018 Breach Investigations Report emphasizes that everyone has a role in managing security risks, but to best mitigate these threats you need to understand what you’re up against.
The latest research from Indegy found that nearly 60% of executives at critical infrastructure operators polled in a recent survey claim they lack the necessary security controls to protect their environment from potentially devastating security threats.
Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!
Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.
Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.