Change & Configuration Management Blog
Read the latest news, developments and opinion pieces on configuration management from industry experts New Net Technologies.
Click on a link below to find out how a layered security approach can improve and speed up your configuration management and protect your files from unauthorized access and changes.
A study by PAS Global recently discovered over 10,000 industrial endpoints that are affected by over 380,000 known security vulnerabilities.
Read NNT CTO Mark Kedgley's latest article Funerals for Glaciers and Antibiotics: Is Anti-Virus Next? published with InfoSecurity Magazine
Students in the Monroe-Woodbury Central School District were expecting to head back to school today, but a ransomware attack forced officials to push back the first day of school.
Financial services companies in the UK reported over 819 cyber incidents to the Financial Conduct Authority in 2018, a stark increase compared to just 69 reported the previous year.
Nearly all organizations, regardless of size, struggle with configuration management and change control. The need to review and approve changes in advance of making them, to formulate impact analysis, testing procedures and contingency plans all serves to slow things down. It’s no wonder most IT professionals acknowledge the potential benefits of Change Control, but simply do nothing about it.
Change Management is blind. It is a key IT Service Management process and, undeniably, it's beneficial to plan and schedule changes. But Change Management’s ‘dirty little secret’ is that, despite the comfort blanket of documentation and approvals, you never know what’s really going on.
Airbus has revealed they recently experienced a cyber-attack that resulted in compromised employee information.
It was announced today that ride-sharing giant Uber will pay $148 million and tighten the company’s data security protections after failing to notify drivers that hackers had stolen their personal information.
Cyber thieves managed to walk away with $13.5 million (944 million rupees) from India’s Cosmos Bank after making illegal withdrawals at ATMs across 28 countries over the past weekend.
The UK government has launched a new cybersecurity standard designed to set a baseline of mandatory security outcomes for all departments with regards to protecting their information, technology, and digital services.
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.