CIS Controls Blog
Read the latest news, developments and opinion pieces on CIS Controls from industry experts New Net Technologies.
As we enter a new year and a new decade, 2020 will be a critical year for businesses and governments around the globe as they deal with a more complex and evolving cyber threat landscape. NNT’s cybersecurity evangelists, CEO Mark Kerrison and CTO Mark Kedgley, have investigated the current state of the industry and identified key cybersecurity predictions and recommendations to help you improve your cybersecurity defenses in 2020.
Detailed information about the job performance of more than 900 Regus employees was accidentally published online after the co-working space provider conducted a review of its sales staff.
New research has found that the Emotet malware strain has increasingly been targeting the United State's government and military.
A Georgia court granted final approval for a settlement involving Equifax in a class-action lawsuit following the massive 2017 data breach.
The Austrian State Department's IT systems were hit by a cyberattack last Saturday and many believe that a "state actor" may be behind the attack.
New findings from FICO claim that UK card fraud accounts for over half of all losses across Europe.
Read NNT CEO Mark Kerrison's latest article highlighting the future of the cybersecurity market and the importance of adopting a best practice framework to mitigate today’s pervasive cyber-attacks.
CafePress is being served with a class-action lawsuit in the United States after allegedly failing to update its security software and informing customers of a data breach months after learning of the incident.
New research has found that cyber attacks on UK businesses increased by 243% over the summer, compared to the same time period in 2018.
Food delivery service DoorDash announced in a blog post on Thursday that the company has suffered a data breach affecting millions of customers, workers, and merchants.
A new study recently conducted by Alert Logic revealed the majority of vulnerabilities in ports are found in just three ports.
Support for Microsoft's 10-year-old operating system, Windows 7, will officially end in six months, yet research shows 18% of larger enterprises still have not migrated to Windows 10.
A new report has found that despite the growing adoption of advanced cyber security tools, SMBs are still vulnerable to long-lasting security breaches compared to enterprise organizations.
The U.S. Senate released a 99-page report last week accusing eight critical agencies of failing to apply basic defenses to cyber attacks, putting public safety and personal data at high risk.
Equifax has incurred losses of over $1.35bn so far following the devasting 2017 data breach involving the breach of 145 million customers personal financial data.
This week Reddit locked down some user accounts after detecting unusual activity on those accounts.
As data breaches continue to increase in severity and scale, more than ever organizations need to ensure they have the basic security controls in place to keep their data safe from attack.
As today’s cyber threats continue to evolve in scale and sophistication, and more security tools and mandates continue to hit the market at a record rate, it can seem overwhelming trying to figure out where to start when trying to keep IT systems safe.
Chilean officials are making cybersecurity a top priority, as they just learned that hackers stole over $10 million from the country’s second-largest bank, Banco de Chile.
It’s been a year since the WannaCry ransomware attack knocked the UK’s National Health Service (NHS) offline, and subsequently infected more than 300,000 devices across 150 nations.
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.