Change & Configuration Management Blog
Read the latest news, developments and opinion pieces on configuration management from industry experts New Net Technologies.
Click on a link below to find out how a layered security approach can improve and speed up your configuration management and protect your files from unauthorized access and changes.
Researchers at Netspoke have found that cloud applications provide ransomware with a means to spread encryption to secondary users without ever downloading the malware again.
The United States Internal Revenue Service announced Tuesday, February 9 that they have been hacked, again.
Read New Net Technologies CTO Mark Kedgley’s latest article online at Pro Security Zone.
Making a distinction between external and internal threats is becoming increasingly difficult and less and less relevant. The issue of internal security threats was highlighted by Geoff Webb's article this week .
As such, when users are ‘over privileged’ in terms of rights and permissions there is an even greater danger that they will be empowered to do far more damage to an organization if they fall victim to such a phishing attack or other malware infection.