Change & Configuration Management Blog
Read the latest news, developments and opinion pieces on configuration management from industry experts New Net Technologies.
Click on a link below to find out how a layered security approach can improve and speed up your configuration management and protect your files from unauthorized access and changes.
Financial services companies in the UK reported over 819 cyber incidents to the Financial Conduct Authority in 2018, a stark increase compared to just 69 reported the previous year.
Nearly all organizations, regardless of size, struggle with configuration management and change control. The need to review and approve changes in advance of making them, to formulate impact analysis, testing procedures and contingency plans all serves to slow things down. It’s no wonder most IT professionals acknowledge the potential benefits of Change Control, but simply do nothing about it.
Change Management is blind. It is a key IT Service Management process and, undeniably, it's beneficial to plan and schedule changes. But Change Management’s ‘dirty little secret’ is that, despite the comfort blanket of documentation and approvals, you never know what’s really going on.
Airbus has revealed they recently experienced a cyber-attack that resulted in compromised employee information.
It was announced today that ride-sharing giant Uber will pay $148 million and tighten the company’s data security protections after failing to notify drivers that hackers had stolen their personal information.
Cyber thieves managed to walk away with $13.5 million (944 million rupees) from India’s Cosmos Bank after making illegal withdrawals at ATMs across 28 countries over the past weekend.
The UK government has launched a new cybersecurity standard designed to set a baseline of mandatory security outcomes for all departments with regards to protecting their information, technology, and digital services.
As demand for IoT devices increases, the issue of network security has become increasingly important, with more businesses and regular households moving everyday tasks and processes to the network and into the cloud.
The UK Information Commissions Office (ICO) has reported a 17% increase in data security incidents between the last three months of 2017 and the first quarter of 2018.
The latest research from the Ponemon Institute found that businesses are still struggling to create a mitigation strategy to efficiently detect, identify and manage insider threats.
Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!
Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.
Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.