Device Hardening Blog
Read the latest news, developments and opinion pieces on device hardening from industry experts New Net Technologies.
Officials based out of the City of Del Rio, Texas, were forced to abandon all electronic services and go back to the days of pen and paper after a ransomware attack rendered City Hall servers useless.
Today the UK government released a new Code of Practice (CoP) intended to drive security-by-design in the manufacture of IoT products.
Google is shutting down its Google+ social network following the disclosure of a software glitch within Google+ that resulted in the exposure of personal-profile data belonging to hundreds of thousands of Google+ users.
The Bristol Airport in the UK suffered widespread outages for past two days after being hit by a ransomware attack on Friday.
Equifax announced yesterday it has agreed to a set of data security rules imposed by a new consent order with eight state financial regulators, the latest response following the data breach that impacted over 147 million consumers.
Details belonging to users of the Israeli genealogy and DNA testing service MyHeritage were found on an internet file containing the email addresses and hashed passwords of more than 92 million of its users.
A recent report found that cybercriminals have been utilizing the infamous Mirai malware as a framework on which to build enhanced IoT malware with more advanced capabilities since it first appeared in late 2016.
The UK Government has released a draft code of practice designed to help manufacturers and end users better safeguard their Internet of Things (IoT) devices.
Security experts are warning that an IoT botnet is targeting financial firms with DDoS attacks, in what many believe is the first of its kind since the notorious Mirai campaign.
Recorded Future has released its 2017 findings for the top 10 vulnerabilities exploited by cybercriminals, an analysis conducted due to a continued weakness in traditional vulnerability databases and scanning tools- they do not indicate which vulnerabilities are currently being exploited.
Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!
Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.
Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.