- Home
-
Products
-
Change Tracker™ Gen7 R2
- Change Tracker Latest Version
- Brochures
-
Blog
- 200,000 Customers Affected by UK-Based Truly Travels Breach
- Researchers Discover a Dozen US Web Servers Hosting 10 Malware Families
- OPM Still Failing on Cyber Security Almost 4 Years After Breach
- Report Finds Malicious Login Attempts on the Rise
- NotPetya Attack Disrupts Merck’s Q2 Global Operations
- CEOCFO Magazine Interviews NNT CEO- Mark Kerrison
- Delta Computer Outage Causes Massive Delays in Service
- FBI Warns Hacked LinkedIn & Myspace Users of Bitcoin Extortion Scam
- Cyber Attacks Against UK Businesses Increase Over Past Year
- World Backup Day Returns to Remind Us to Protect Our Data
- IoT Security Lacking in Southeast Asian Organizations
- UK’s National Cyber Security Centre Set to Open in October 2016
- HPE Releases 2016 Cyber Risk Report
- TalkTalk’s Breach to Cost an Estimated £80 Million in Losses
- Dutch Government Votes No on Encryption Backdoors
- New Zealand Introduces New Cyber Security Strategy
- EU's New Cyber Security Law Encourages Firms to be Open about Security
- United Airlines Bug Bounty Program Backfires After Extreme Delays in Patching
- Operation 'Resilient Shield' to Test the UK Financial Sector
- China and Germany Work Together to Ward off Cybercrime
- Part III- The Next Generation of Breach Prevention
- Part II- The Next Generation of Breach Prevention
- Part I- The Next Generation of Breach Prevention
- The Top 6 Security Threats Financial Firms will Face in 2016
- UK firms hit as Dridex criminals target 385 million emails
- NEW NET TECHNOLOGIES DEBUTS CHANGE TRACKER™ GENERATION 7
- URI Current & Former Students Email Credentials Compromised
- Analogue criminals are going digital, says police study
- 2014 saw step change in anti cyber attack collaboration
- NNT Change Tracker receives another 5 Star Review from Secure Computing
-
Videos
- Mega-Scale Change Control
- IBM QRadar® Integration – IBM Validated
- What's New - Gen7 R2?
- NNT Change Tracker™ Detects Unplanned Changes and Creates New Security Incidents in ServiceNow®
- NNT Change Tracker Gen 7 Short Features Video
- Easily Compare & Contrast Compliance Reports with Gen7
- Watch the pre-recorded Change Tracker 7 demo
- NNT Change Tracker Enterprise: Managing the Enterprise Attack Surface
- Webinars
-
Press Releases
- New Net Technologies Teams with Cherwell to Offer Intelligent Change Control
- NNT and CIS Announce Strategic Partnership - Change Tracker Gen7R2 is Offered by CIS
- NNT Change Tracker Gen7 Receives Application Certification from ServiceNow®
- NNT Unveils the Future of Intelligent System Integrity Monitoring: Gen7 R2
- NNT Joins Forces with SANS Institute for Unstoppable Partnership
- Cyber Defense Magazine Recognizes NNT as Top 20 Cyber Security Leader of 2016
- New Net Technologies Recognized as a 2016 Top 100 Cyber Security Vendor by Research Company Cybersecurity Ventures
- Change tracking for database vulnerability assessment
- New Net Technologies Launches NNT Change Tracker Version 6 to Improve Scalability, Performance and Security Across All Platforms
- New Net Technologies (NNT) Launches NNT Change Tracker v5.5
- New Net Technologies (NNT) Launch Next Generation of NNT Change Tracker and NNT Log Tracker Enterprise in Defiance of Expensive Alternatives for PCI Compliance
- New Net Technologies Awarded Best Computer Security Service of Naples
- FAST Cloud™ Threat Intelligence Integration
-
Log Tracker Enterprise™
- Brochures
-
Event Log Management
- Articles
- White Papers
-
Case Studies
- PIC Inc. Achieves PCI Compliance with NNT Change Tracker and Log Tracker
- SIEM and Event Log Management Case Study: Leading Finance Provider Wonga Meets PCI Compliance Needs for SIEM and FIM Using NNT
- Managed Security Services Case Study: WH Smith Manages PCI DSS Compliance by the Book With NNT Log Tracker SIEM Solution
- Blog
- Vulnerability Tracker™
-
Change Tracker™ Gen7 R2
-
Products
-
NNT Change Tracker Generation 7™
NNT Change Tracker Generation 7™ delivers market-leading Breach Prevention and Detection NNT FAST Cloud Integrated Threat Intelligence
NNT FAST™ (File Approved-Safe technology) Threat Intelligence automatically evaluates file changes in real-time Log Tracker Enterprise
Comprehensive and easy-to-use Security Information and Event Management (SIEM) solution
-
NNT Change Tracker Generation 7™
-
Solutions
- SecureOps™
- ITSM Integration
- SIEM Integration
-
CIS Controls
-
Blog
- UK Card Fraud Accounts for Half of All Losses Across Europe
- Your Best Bet for a Safe Ride? Buckle Up with a Best Practice Security Framework
- CafePress Faces Class-Action Lawsuit Following Data Breach
- Cyber Attacks on UK Businesses Soar 243%
- DoorDash Confirms Data Breach Impacting 4.9 Million Users
- Study Finds Majority of Port Vulnerabilities are Found in Three Ports
- Research Finds Almost 20% of Orgs Still Running Windows 7
- SMBs Lack the Resources, Technology, and Visibility Needed to Protect Organizations
- Federal Agencies are Failing at Cyber Security Basics
- Equifax Has Spent $1.35 Billion on 2017 Data Breach Costs
- Reddit Locks User Accounts Due to ‘Security Concern’
- Understanding the Basic CIS Controls: CSC 1-6
- Implementing the CIS Controls to Fight Against the Evolving Threat Landscape
- Bank of Chile Loses $10 Million in Recent Cyber Attack
- 1 Year Since WannaCry: What Have We Learned?
- Trump’s Cyber Security Advisers Resign in Light of Growing Cyber Threats
- UK Gov Claims UK Charities Vulnerable to Cyber Attacks
- LG Hit with Ransomware Identical to WannaCry
- Study Finds Orgs Have Yet to Improve Security Hygiene since WannaCry & Petya
-
Articles
- CIS Control 1: Inventory and Control of Hardware Assets
- CIS Control 2: Inventory and Control of Software Assets
- CIS Control 3: Continuous Vulnerability Management
- CIS Control 4: Controlled Use of Administrative Privileges
- CIS Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers
- CIS Control 6: Maintenance, Monitoring and Analysis of Audit Logs
- CIS Control 7: Email and Web Browser Protections
- CIS Control 8: Malware Defenses
- CIS Control 9: Limitation and Control of Network Ports, Protocols, and Services
- CIS Control 10: Data Recovery Capabilities
- CIS Control 11: Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches
- CIS Control 12: Boundary Defense
- CIS Control 13: Data Protection
- CIS Control 14: Controlled Access Based on the Need to Know
- CIS Control 15: Wireless Access Control
- CIS Control 16: Account Monitoring and Control
- CIS Control 17: Implement a Security Awareness and Training Program
- CIS Control 18: Application Software Security
- CIS Control 19: Incident Response and Management
- CIS Control 20: Penetration Tests and Red Team Exercises
- Before Chewing Through Compliance, Nibble the CIS Controls
- CIS Control 1
- CIS Control 2
- CIS Control 3
- CIS Control 4
- CIS Control 5
- CIS Control 6
- CIS Control 7
- CIS Control 8
- CIS Control 9
- CIS Control 10
- CIS Control 11
- CIS Control 12
- CIS Control 13
- CIS Control 14
- CIS Control 15
- CIS Control 16
- CIS Control 17
- CIS Control 18
- CIS Control 19
- CIS Control 20
-
Blog
- CIS CyberMarket
-
File Integrity Monitoring (FIM)
-
File Integrity Monitoring Resources
- White Papers
- Case Studies
-
Articles
- Faster Detection Saves Orgs 70% in Data Breach Costs
- Threat Intelligence- Tell Me Everything, but Only What I Need to Know
- Implementing Layered Security to Protect Against Modern Malware
- File Integrity Monitoring: Your Last Line of Defense in Achieving PCI DSS Compliance
- Windows File Integrity Monitoring 101
- The Finance Industry- The Perfect Ploy in a Cyber Criminals Scheme
- Is all fraud preventable? File integrity monitoring and what should businesses be doing?
- File Integrity Monitoring – 3 Reasons Why Your Security Is Compromised Without It Part 2
- File Integrity Monitoring – 3 Reasons Why Your Security Is Compromised Without It Part 1
- Which File Integrity Monitoring Technology Is Best For FIM? File Integrity Monitoring FIM or SIEM FIM?
- A New Role for FIM in the Unix and Linux World – Undoubtedly, This is The Shape of Things to Come…
- File Integrity Monitoring Software
- File Integrity Monitoring – Use FIM to Cover All the Bases
- File Integrity Monitoring - FIM Could Just Save Your Business
- Agentless FIM – Why File Integrity Monitoring Without Agents Is The Same, and Better, and Worse than using Agents
- File Integrity Monitoring and SIEM - Why Layered Security Is Essential to Combat the APT
- Press Releases
- Videos
-
Blog
- American Gunmaker Smith & Wesson Hacked in Magecart Attack
- Macy's Online Shoppers Hit by Magecart Data Breach
- Media Giant Nikkei Losses $29m in BEC Scam
- Monetization of IoT Cyber Attacks on the Rise
- DDoS Attack Knocks Parts of Wikipedia Offline
- Organizations Insufficiently Securing IoT and IIoT Devices
- Looking for the Magic Quadrant for FIM/File Integrity Monitoring?
- Scammers Nab $2.5 Million from North Carolina County through BEC Scam
- BEC Scams Cost US Orgs $300m Per Month
- Beware of Phishing Scams during Amazon Prime Day
- 66% of North American Homes Have Multiple IoT Devices
- Cyber-Security Of The Fridge: Assessing The Internet Of Things Threat
- Triton Malware Found Inside Second CNI Facility
- Cybercriminals Outspend Organizations in Uphill Cybersecurity Battle
- Virginia Bank Hit by Coordinated $2.4M ATM Attack
- BEC Scams Costing Orgs Over $12 Billion in Losses
- U.S. Government Warns of North Korean APT Malware
- U.S. Disrupts Russian Botnet of 500,000 Infected Routers
- Sears, Delta Air Lines Report Customer Data Breach
- Three-Quarters of Orgs Experienced Phishing Attacks in 2017
- A Look into the Future: 2018 Malware Predictions
- Over 400M Malware Infections Detected in Q3
- Chinese KeyBoy Group Spotted Targeting Western Organizations
- Nearly 75% of Security Incidents Originate Inside the Extended Enterprise
- CCleaner Server Compromised in Beginning of July
- Study Finds Organizations Doing Little to Protect Against Insider Threats
- Lithuanian Man ‘Whales’ 2 U.S. Tech Companies out of $100 Million
- WikiLeaks Exposes CIA Tools for Stealing SSH Credentials
- U.S. Fashion Retailer Suffers Malware Infection on PoS Systems
- OneLogin Reports Unauthorized Access Issue
- Google Phishing Attack Targeted Permissions & Credentials
- Australian ISP Suffers DDoS Attack
- Spammers Caught Red Handed After 1.4 Billion Email Addresses Leaked Online
- Kids’ Voice Messages Exposed in CloudPets Data Breach
- TeamSpy Malware Strikes Again to Steal Data
- InterContinental Hotels Confirms Breach at 12 Hotels
- Best Practice Guide Offers Security Advice to Boards of Directors
- Report Finds Stark Increase in Number of U.S. Data Breaches
- UK Commits to Ground Breaking Cyber Security Strategy
- 3.2 Million Payment Card Details Leaked in Massive India POS Breach
- FBI Asks Ransomware Victims to Come Forward and Share their Experiences
- HEI Hotels & Resorts POS Systems Plagued by Malware
- Study Finds Majority of Organizations have Suffered from Data Loss or Theft in the Past 2 Years
- U.S. Olympian Michael Phelps Targeted by Hackers in DDoS Attack
- Interbank Payments Become Fraudsters Latest Targets
- Landmark Email Privacy Case Overturned in Favor of Microsoft
- Pokémon Go Sparks Controversy over Privacy & Security
- Security Pros Concerned about the Future of DDoS Ransom Threats
- FBI Claims Business Email Compromise Scams Tops $3.1 Billion
- The Bank Vault Isn’t Secure: So What Hope Do the Rest of Us Have?
- High-Profile News Outlets Suffer From Malvertising Attacks
- 2016 Tax Fraud Estimated to Exceed $21 Billion
- Cybercriminals Targeting Finance Departments with Malicious Emails
- DDoS Learning Curve - How to Better Protect Yourself
- FBI Warns Holiday Shoppers of Too Good to be True Deals this Season
- Learn How to Spot Malicious Activity as Soon as it Happens
- Thousands of Lloyds customers have personal data stolen
- 3/4 of UK Businesses Not Confident Detecting Data Breaches
- Security breaches - hiding in plain sight
- Hacking Team identity linked to Gamma International attack
- Ransomware, Phishing And Spam Attacks Hit New Highs
- Overly complex IT security solutions put companies at risk
- UK Breach Costs Rise 7% Over Two Years
- SMEs not protecting themselves against cybercrime
- Phishing in the C-Suite: Executives Vulnerable to Attacks
- DDoS Attack Study Shows U.S. Companies Better Equipped for Cyber Security Issues
- If you can’t stop the breach, at least spot the breach
- Fighting Against Change
- Hiding in Plain Sight
- Almost half of firms will plan for cyber-attack disruption by 2018
- Gemalto investigates claims of hacking by NSA and GCHQ
- More on Carbanak APT - The $1B Cyber Crime
- Ransomware Website attack anatomy exposed – Essentials tips for Web Application protection
- Book2park.com breach uncovered – how big is the breach and how did it happen?
- If antivirus technology only detects half of all malware, what will you do about the other half it ignores?
- Skeleton Key AD malware asks tough questions about how you manage security for your organization
- Will 2015 be the year of DDOS Extortion? New trojan out to attack Linux platforms
- All I want for Christmas is security
- Hackers Lurked Undetected Inside Electronic Payment Solutions Provider Since 2009
- Sony Breach - What we now know
- Welcome To My Cyber Security Nightmare
- Hackers breach the White House
- Not just NNT saying that file integrity monitoring is key...
- Backoff malware targeting POS Systems - Sharp rise in Q3 infections
- 2014 iDefense Report – Not just NNT saying you should implement File Integrity Monitoring
- IT Security Tops Christmas Lists with 41% of Businesses Increasing Their Budget
- Tackling The Generation Gap In Cyber Security – Echoing NNT Concerns
- The Last Rites of Traditional IT Security
- IT Security Industry To Expand Tenfold
-
File Integrity Monitoring Resources
-
System Hardening and Vulnerability Management
-
CIS Benchmark Hardening/Vulnerability Checklists
-
CIS Benchmark Resources
-
Blog
- Reported Security Breaches Skyrocket in Canada Following New Privacy Law
- Senators Urge Investigation into AWS Following Capital One Breach
- DLA Piper to Sue Insurer over NotPetya Claim
- Typeform, Popular Survey Software, Data Breach Hits Several Organizations
- Cyber Incidents Doubled in 2017
- Whole Foods the Latest Victim of Payment Card Data Breach
- VMWare API Abused to Access Guest Operating Systems
- Industroyer Malware Said to be Linked to Kiev Attack
- Cyberattacks Using Exploits up by 25 Percent in 2016
- Attention Hospitality Industry- Protect your Point-of-Sale Systems!
- Home Depot to Pay an Additional $25 Million in Data Breach Settlement
- CIS Security Controls Continue to Gain Mainstream Adoption
- Audit Finds Western Australian Government Failing to Protect Sensitive Data
- Data Security- A Learning Process
- Prioritizing Patch Management Critical to Security
- Harden 2012R2....and keep it that way!
- Why we all need better password policies - United Airlines' MileagePlus accounts plundered
- NNT awarded new CIS Security Software Certifications
- NNT now an Official OVAL Adopter - Here’s an acronym-fest to celebrate - OVAL, XCCDF, CIS, CVE, CCE, CVSS, DISA STIG & NVD!
-
Articles
- Modernising Your Cyber-Security Approach - A Panel Discussion
- CIS Rebrands to Reflect Evolving Online Threat Landscape
- Target Reaches $39.4 Million Settlement with Banks over 2013 Data Breach
- The Windows Advanced Audit Policy Configuration
- What are the recommended Audit Policy settings for Windows when implementing logging for the PCI DSS or other security standard?
- Case Studies
- Videos
-
Webinars
- Any Port In a Storm of Cyber-Security Remains a Problem: CIS Control 9
- Cybersecurity Lesson from the Death Star: CIS Control #5 Explained in 30 Minutes
- Webinar - Stop the Breach or Spot the Breach? A joint CIS & NNT Event
- Webinar: Modernizing Cyber Security with CIS
- Webinar: 2016 Cyber Security Threat Predictions Webinar & Whitepaper Synopsis
-
Blog
-
CIS Benchmark Resources
- Database System Hardening
-
Server Hardening Resources
- White Papers
- Videos
-
Articles
- Disable Windows Services
- Cyber Threat Sharing Bill and Cyber Incident Response Scheme – Shouldn’t We Start with System Hardening and FIM?
- File Integrity Monitoring – Database Security Hardening Basics
- Linux Server Hardening
- Windows Server 2008 2008R2 Hardening Guide
- Server Hardening Checklist - Which Configuration Hardening Checklist Will Make My Server Most Secure?
- What are the recommended Audit Policy settings for Linux
- Case Studies
-
Blog
- Microsoft and NIST Partner to Create Enterprise Patching Guide
- FDA Issues Warning over Vulnerabilities in Medical Devices
- System Hardening, and Why it's Harder Than it Looks
- Is system hardening like an appendectomy?
- $700 Million Settlement Reached in 2017 Equifax Data Breach
- Freedom Mobile Exposes Details of Customer Payment Card Data
- Ransomware Attack Takes Down City of Del Rio
- UK Government Unveils “World First” IoT Code of Practice
- Google Shutting Down Google+ Platform Following Privacy Vulnerability
- Bristol Airport Hit by Ransomware Attack
- Equifax Signs Consent Order with 8 States Following Data Breach
- DNA Testing Firm MyHeritage Leaks Data on 92 Million Users
- Mirai IoT Malware Success Highlights Dangerous Security Threats
- UK Government Reveals New IoT Best Practices
- New IoT Botnet Targets Financial Sector
- New Details Released on Top 10 Vulnerabilities Exploited by Cybercriminals
- GitHub Hit by Largest DDoS Attack Ever Recorded
- 32 Lawsuits Filed Against Intel for CPU Security Flaws
- Equifax Breach Gets More Complicated as New Details Surface
- Microsoft Issues Emergency Fix for Meltdown Vulnerability
- Major ‘Meltdown’ and ‘Spectre’ CPU Security Flaws Discovered
- California Voter Information Published on Dark Web
- Mirai Attackers Plead Guilty
- DDoS Attacks Spike by 91% since Q1 2017
- Equifax Profits Drop 27 Percent Following Data Breach
- US Senators Introduce SAVE Act to Protect Election System
- DDoS Attack Knocks Czech Election Sites Offline
- New Botnet Targets Improperly Secure IoT Devices
- PwC Security Survey Shows Orgs Still Struggling to Build Cyber Resilience
- Accenture Exposes Sensitive Data in AWS Misconfiguration
- Equifax CSO & CIO Resign Following Patch Neglect
- Equifax Ignored Patch 2 Months Prior to Hack
- Cyber-Security of the Fridge: Assessing the Internet of Things Threat- Update
- 1.2 Million NHS Patient Names Exposed in Data Breach
- DDoS Attacks Surge in Q2
- US Senators Introduce Bipartisan IoT Security Bill
- Game of Thrones Script Leaked After HBO Suffers Data Breach
- University College London Hit by Ransomware Attack
- Hackers Expose 17 Million Zomato User Credentials on the Dark Web
- Confidential Messaging App Confide Riddled with Security Vulnerabilities
- Consumer Reports Expected to Include Cyber Security in Product Reviews
- Luxury Austrian Hotel Hit by Ransomware Attack
- U.S. Election Assistance Commission Hacked by Russian Hacker
- Massive DDoS Attack Cripples Popular Websites for Large Part of Friday
- St. Jude Medical Denies Device Vulnerability Allegations
- Cloud Adoption Continues to Grow While Security Lags
- Study Finds Organizations are Severely Lacking in Privileged Account Management
- TalkTalk Still Suffering the Aftermath of Catastrophic Data Breach
- Watch Out FedEx Customers- The Bad Guys Are Coming!
- World's biggest maker of routers fighting new cyber attack
- The Carphone Warehouse attack: a wake-up call to UK business
- TV5Monde in chaos as breach costs roll into the millions
- Mozilla blocks Flash after Hacking Team incident
- Dangerous Apple 0-Day Exposes App Credentials
- Timeline of the World's Biggest Data Breaches
- DDoS attacks affecting more countries than ever before
- Bettys Tea Shop loses 122,000 records in data breach
- Data breaches to cost businesses $2.1 trillion by 2019
- RussianDoll hackers exploit Adobe and Windows zero-days
- UK firms horribly unprepared for data breach response
- Xbox Live downed by new DDoS attack
- Batten down the hatches! Looking at ways to enhance protection against ransomware, APTs and other phishing malware
- Defending against DDOS
- Disabled Windows Services
- Configuration Remediation Kit
- Open Ports, Protocols and Services Hardening
- WHAT ARE THE RECOMMENDED AUDIT POLICY SETTINGS FOR WINDOWS WHEN IMPLEMENTING LOGGING FOR THE PCI DSS OR OTHER SECURITY STANDARD?
- NNT Ransomware Mitigation Kit
-
CIS Benchmark Hardening/Vulnerability Checklists
- Hardening Open Network Ports, Protocols and Services
-
Configuration Management - Intelligent Change Control
-
Configuration Management Resources
-
Blog
- First Day Back to School Delayed Due to Cybersecurity Threat
- Financial Sector Facing Record Number of Cyber Attacks
- Embracing Configuration Management & Closed-Loop Intelligent Change Control
- Cyber Security's 'Dirty Little Secret'
- Airbus Employee Data Compromised in Cyber-Attack
- Uber to Pay $148M Settlement after 2016 Data Breach Scandal
- Hackers Steal Nearly $14 Million from Indian Cosmos Bank in ATM Attack
- UK Releases Minimum Cyber Security Standard for Government Departments
- 3 Simple Steps For Securing Your Network
- Data Security Incidents on the Rise as Human Error Dominates
- Insider Breach Costs Soar to $8.7+ Million
- Verizon Releases Latest Breach Investigation Report
- Majority of Critical Infrastructure Operators Vulnerable to Attack
- 2017 Named Worst Year Yet for Cyber Threats Targeting UK Firms
- Less Malware Reported, but Increase in Sophistication
- Samba Issues Patch for 7-Year-Old Wormable Bug
- Scottrade Bank Exposes Credentials of 20,000 Customers
- Cyber Attack Forces UK’s Largest NHS Trust Offline
- Are Small & Medium Sized Businesses Taking Security Seriously?
- U.S. Internal Revenue Service Hacked- Again
- Social Security & Banking Information Compromised in TaxAct Breach
- IT Professionals Feel Responsible for Securing Company Data
- Top 5 Online Fraud Predictions- What to Expect in 2016
- Sophisticated Cherry Picker POS Malware Goes Undetected for Four Year
- UK’s Latest CyberInvest Plan to Help Strengthen CyberSphere
- Uber Software Flaw Exposes Hundreds of Drivers Personal Information
- Study Finds Quarter of Companies Can't Figure Out How Hackers Got In
- Cyber Security | A Shared Responsibility
- Experian Exposes 15 Million T-Mobile Customers Credentials
- Point-of-Sale Breach Linked to Hilton Hotel Properties
- Cyber insurance not trusted by business, KPMG claims
- Cities 'wide open' to cyber-attacks
- GHOST vulnerability - How to check for it, and how to remediate it
- 2014 - Year of the Breach - Lessons learned from recent breaches
- The biggest threat to IT Security could be you
- Preventing Employee Own Goals
- Press Releases
-
Articles
- October is National Cyber Security Awareness Month- So Just How Secure is Your Organization?
- Department of Homeland Security’s Cyber Security Still Vulnerable
- File Integrity Monitoring – 3 Reasons Why Your Security is Compromised Without it Part 3
- File Integrity Monitoring - Is FIM Better Than AV? Is a Gun Better Than a Knife?
- White Papers
- Case Studies
-
Blog
-
Configuration Management Resources
-
Continuous Compliance - Cyber Security Controls
- CESG Assured Service (Telecoms) - CAS (T)
- COBIT, ITIL and ISO27001
-
DISA-STIG
-
Blog
- South Korean Hosting Firm Pays Record-Setting $1 Million Ransom Demand
- NNT Awarded Army Certification of Networthiness Accreditation
- U.S. Aviation Authorities Recommend New Cybersecurity Measures
- Hacked Swedish Military Server Used in 2013 Financial Attacks
- UK Builds £40 Million Military Cyber Defense Center
- Chinese National Pleads Guilty to Hacking U.S. Defense Systems
- Articles
-
Blog
-
FDCC-USGCB
-
Blog
- 2 Million Michigan State Employees PII Exposed
- US Department of Defense Announces Launch of ‘Hack the Pentagon’ Bug Bounty Program
- U.S. Government Introduces New ‘National Background Investigation Bureau’
- Tim Cook Lashes Out During Meeting With US Government Over Encryption
- White House Officials Meet with Tech Giants to Discuss Fighting Terror
-
Blog
- FedRAMP
- Fiscam
-
General Data Protection Regulation (GDPR)
-
Blog
- Italian Bank UniCredit Suffers Data Breach
- Report Finds Over Half of UK Orgs Still Not GDPR Compliance
- ICO Issues Huge Fines to British Airways, Marriott
- Facebook Urged to Provide Breach Details to UK Regulators Swiftly
- Data Breach Reports Have Quadrupled Under GDPR
- Update: Timehop Reveals More Personal Data was Compromised in Data Breach
- Facebook Fined £500,000 Over Cambridge Analytica Scandal
- Timehop Data Breach Hits 21 Million Users
- Latest NCSC Report Highlights Top Cyber Threats to UK Businesses
- Trend Micro Predicts Known Vulnerabilities will Plague 2018
- Third Party Cyber Incidents Costing Businesses Millions
- Pizza Hut Customers Enraged by Delayed Breach Notification
- 1.9 Million Records Compromised First Half of 2017
- UK Retail Breaches Double in the Last Year
- UK Government Will Invest £21 Million in NHS Cybersecurity
- Cloud Services Falling Behind in GDPR Migration
- New Breach Guidelines Issued by European Banking Authority
- EU’s New ‘General Data Protection Regulation’
- Articles
-
Blog
-
HIPAA HITECH
-
Blog
- Unprotected Medical Images and Data Belonging to Millions of Americans Found Online
- Wyoming Hospital Systems Down After Ransomware Attack
- IBM's Annual Cost of a Data Breach Report Released
- More Healthcare Firms Impacted by AMCA Breach
- Premera Blue Cross Agrees to Pay $10 Million to States over Data Breach
- Data Breach May Have Exposed Nearly 12 Million Quest Diagnostics Patients
- Study Finds Healthcare Orgs Failing on Cybersecurity Hygiene
- U.S. Attorneys General File First Multi-State HIPAA Related Lawsuit
- Anthem Agrees to $16m HIPAA Settlement
- Leading U.S. Healthcare Provider Hit by Targeted Phishing Attack
- Securing Electronic Health Records: What’s at Stake?
- 70% of Healthcare Organizations Suffer from Data Breaches
- New Study Claims Larger Healthcare Orgs are More Susceptible to Breaches
- Stolen Medical Data Becoming too Common for English Adults
- 400K Patient Records Exposed in January Healthcare Breaches
- Banner Health Warns 3.7 Million of Data Breach
- Pending New York Data Breach Legislation Could Affect PHI Security
- 98% of Leaked Healthcare Data Caused by Large Scale Attacks
- Is Your Health Data in the Right Hands?
- Healthcare Industry Still Falling Behind in IT Security Efforts
- United States Consumers Fearful of Cyber-Attacks
- Audit Finds Healthcare.gov Guilty of Weak Cyber-Security Practices
- Healthcare Institutions are Three Times More Likely to be Targeted for Cyber Attacks
- Encrypted medical databases shown to leak information
- NHS blunder breaches data on 3000 patients
- Security Stories to Watch: Data Breaches, Human Error and More
- HIPAA Compliance - New Resources to Further Reduce Cyber Security Risk to Healthcare Systems
- Epidemic of medical data breaches leaking our most sensitive information
- White Papers
- Articles
-
Blog
-
NERC CIP Version 5
-
Blog
- US Energy Company Fined $10 Million for Cybersecurity Failures
- Port of San Diego Suffers Ransomware Attack
- House Passes Bill to Address Industrial Cybersecurity Threats
- U.S. Offers $25 Million Cybersecurity Grant after Recent Pipeline Attacks
- FERC Proposes Updates to NERC CIP Standard
- UK Firms Fear Cybersecurity Threats in Energy Sector
- Study Find 3,000 Industrial Sites hit by Non-Targeted Malware a Year
- US Oil and Gas Firms Falling Behind in Cyber Security Preparedness
- BlackEnergy Malware Linked to Ukrainian Power Outage
- Fictional APT attack on NorthEastern Energy grid predicts costs of $1T and 93 million left without power
- British Gas bows to criticism over blocking password manager
- Destructive Cyber-Attacks Blitz Critical Infrastructure
- NERC CIP compliance: Power grid under attack every four days - or is it more frequent?
- ICS-CERT: 38% of Breaches Used An 'Unknown' Access Vector
- NERC CIP 5 Update: Critical vulnerability found in Schneider Electric SCADA Gateway
- Steel Mill shut down by hackers - Does NERC CIP have a wider remit?
- BlackEnergy malware infects industrial control systems
- Case Studies
- Articles
- FAQ
-
Blog
-
NIST 800 53
-
Blog
- Cybersecurity Certification Program for US Defense Contractors Expected in 2020
- Louisiana Declares State of Emergency Following Cyber Attack
- California State Auditor Finds Flaws in Government IT Systems
- U.S. State Department Failing to Address Cybersecurity Basics
- NIST Small Business Cybersecurity Act Signed into Law
- IIC Releases New IoT Endpoint Best Practice Guide
- Details Behind DoD Cybersecurity Scorecard 2.0 Released
- Wi-Fi Alliance Enhances Security Measures for 2018
- Report Finds Federal Websites Still Lack Basic Security Requirements
- NIST Issues New Cybersecurity Workforce Framework
- Trump Signs Cybersecurity Executive Order
- NIST Releases Guidelines to Enhance Email Security
- NIST Updates Telework Guidelines after 7 Years
- Humans- The Perfect Exploit in a Hackers Scheme
- Hackers 'stole data of millions of US government workers'
- Survey: 75 percent of companies have significant risk exposure
- Millions of US government workers hit by data breach
- Articles
-
Blog
-
NIST 800 171
-
Blog
- U.S. Government Payment Provider Exposes 14M Records
- DoD Issues New Guidance to Drive NIST 800-171 Compliance
- Danish Railway Company Suffers DDoS Attack
- Cyberattack Proves Gas Pipelines Vulnerable to Attack
- IoT Security Spending Expected to Reach $1.5 Billion in 2018
- What You Risk by Not Guaranteeing NIST 800-171 Compliance
- Updates to NIST Cybersecurity Framework to be Revealed Spring 2018
- 21K Soldiers and Civilians Impacted by US Marines Data Breach
- DOJ Unveils New Cybersecurity Task Force
- Is Your Organization Ready for NIST 800-171?
- Articles
-
Blog
-
PCI DSS Compliance
-
White Papers
- PCI DSS Compliance: 6 Steps to get compliant - and stay compliant
- PCI DSS 101 - the background you need to understand the PCI DSS
- The Target Breach - NNT’s Perspective
- PCI Compliance in 10 minutes a day UPDATED FOR PCI DSS 3
- PCI DSS V3.2.1 Compliance Solution Brief - Learn Now NNT Solutions Address PCI DSS Requirements
-
Articles
- PCI DSS 2018: What Does the Future Hold?
- PCI DSS- The Present & Future
- PCI – Going Beyond the Standard: File Integrity Monitoring
- Customer is King, but what do they want when it comes to online Security?
- PCI DSS POS breach: Do you allow 3rd party access to your systems or provide IT services to customers with Governance, Risk Management and Compliance responsibilities?
- Is Your QSA Making You Less Secure?
- PCI DSS Version 3 and File Integrity Monitoring – New Standard, Same Problems
- File Integrity Monitoring - View Security Incidents in Black and White or in Glorious Technicolor?
- FIM for PCI DSS - Card Skimmers Still Doing the Business After All These Years
- Tokenization, the PCI DSS and the Number One Threat to Your Organization's Data
-
Case Studies
- Leading Payment Gateway Chooses NNT for PCI Compliance
- Payment Service Provider Passes PCI Audit With Change Tracker Gen7 R2
- PCI Compliance via a 'Homeostatic Equilibrium' - Miles Technologies
- NNT Gets ABRSM in Tune with PCI DSS
- NAFSA is Well Educated and Learned in PCI DSS Compliance
- Biaggi's Ristorante Italiano Order NNT Change Tracker to Satisfy PCI Hunger
- Harrods Selects NNT Change Tracker for PCI DSS Compliance
-
Press Releases
- New Net Technologies (NNT) Announces Strategic Partnership with Leading Indonesian Technology Consultants, Dinantara
- NNT secures the IT infrastructure of Public Interest Communications Inc and protects against malware attack
- New Net Technologies (NNT) delivers significant growth in first quarter of its 2012 financial year
- New Net Technologies (NNT) Ltd to Partner with PCI Security Standards Council to Improve Payment Data Security Worldwide
- ABRSM selects NNT Change Tracker and NNT Log Tracker for PCI DSS compliance
- NNT Launches new PCI DSS service to enable your organization to become compliant and remain compliant.
- Videos
- Webinars
-
Blog
- Thousands of Online Shops Hit by Magecart Attack
- Apps Used to Book Hotels Targeted by Skimming Attack
- 23 Million Stolen Debit and Credit Cards Found on the Dark Web
- Magecart Attack Hits 960 e-Commerce Stores
- PoS Systems Infected with Malware at Checkers and Rally's Restaurants
- PoS Systems Infected with Malware at Checkers and Rally's Restaurants
- Wendy’s Reaches $50 Million Settlement over Payment Card Breach
- Huddle House Restaurant Chain Suffers POS Malware Breach
- Sotheby’s Website Infected with Magecart for 19 Months
- Cheddar’s Scratch Kitchen Breach Hits Over Half a Million Customers
- Chili’s Suffers Payment Card Breach
- Travel Booking Giant Orbitz Suffers Data Breach
- Applebee’s Chain Hit with Payment Card Breach
- Forever 21: Payment Systems Breached for Seven Months
- Beware: 50 Million Global Fraud Attempts Expected Next Week
- Hyatt Hotels Suffers from Another Card Data Breach
- Half of Orgs Failing in PCI Compliance
- Cinema Chain Suffers Possible Two Year POS Breach
- Restaurant Chain Chipotle Finds Suspicious Activity on POS System
- Here we go again: Intercontinental Hotels Suffers Major Card Breach
- PoS Breach Hits Select Restaurants Across the US
- Fraudulent Credit Card Purchases Now Burden Retailers Slow to Upgrade Payment Terminals
- Trump Hotels Investigating Yet Another Data Breach
- Home Depot Settles Lawsuit over 2014 Data Breach
- Wendy’s Breach Expected to Surpass the Losses of Target & Home Depot
- Going Digital- Replacing Cards with Smartphones
- The State of PCI Security
- Landry’s Announces List of Restaurants & Venues Affected by POS Breach
- Hyatt Hotels- Latest Victim of POS Malware Attack
- Heads up Retailers- Consumers Won’t Shop with Breached Businesses
- Highly Sophisticated ModPOS Malware Spotted
- 54 Starwood Hotel Establishments Infected with POS Malware
- Retailers Growing Frustrated by Push Back From Banking Industry
- Point-of-Sale Breach at Peppermill Resort Spa Casino
- FBI’s Chip-Based Credit Card PSA Removed after Complaints from Banks
- Surge in Fraudulent Debit Card Transactions at United States Walmarts
- Debit Cards Falling Behind Credit Cards in EMV Migration
- Malware Targets Pennsylvania Holiday Inn’s Computer System
- Contactless payment limit raised from £20 to £30
- Carphone Warehouse customer data breach investigated
- PCI DSS- Detroit Zoo One of Many Affected by SSA Breach
- CVS investigating possible payment card breach
- What does the future hold for the payment card industry?
- eBay e-commerce platform under attack
- PCI Council launches group to help improve SME compliance
- Attacks on Point of Sale systems are racking up huge losses for companies
- Sally Beauty May Have Suffered a Second Security Breach
- PCI gives 14 months to fix high risk SSL problem
- PCI DSS 3.1 Forces Move From SSL to TLS
- Change Tracking for PCI DSS Compliance
- 3 new breaches reported: Hotel POS systems infected with malware, Aquarium supplies website compromised and a POS Systems provider investigates card data theft from its customers’ systems
- TalkTalk's hacked customer data: A feast for fraudsters and phishing scammers
- 3 new breaches – a hacked eCommerce site, POS malware and a spear phishing attack
- Exposing a cyber criminal gang responsible for the theft of $100M's, credit cards and intellectual property
- Established telecom company chooses New Net Technologies to ensure PCI DSS compliance
- New breaches show every organization is potentially at risk and why file integrity monitoring would have helped
- New Net Technologies Letter To The Editor Of Retail Technology
- Moonpig app pulled over security fears
- Cyber attacks on retailers becoming more targeted - Is the PCI DSS V3 enough?
- Suspected POS breach at Chick-fil-A: Did the PCI DSS fail?
- Staples Breach - Bigger than expected
- More pressure on Retailers to confront cyber security threats - LusyPOS and Bebe Store Breach
- Why are retailers still falling prey to the same problem? It's time to spot the breach!
- Point-of-Sale Malware “d4re|dev1|” is Attacking Ticket Machines and Electronic Kiosks
- Union Bank Bags PCI DSS Certification
- Update on PSD2 – the PCI SSC view
- HSBC Acknowledges Massive Payment Card Breach
- Partnership brings PCI DSS compliance to Nigeria
- Staples payment card breach suspected - Has BlackPOS struck again?
- POS Protection - If Target didn’t concern you, maybe Home Depot will?
- PCI DSS: Best Practise to ensure compliance
- Dairy Queen confirms breach, Backoff malware intrusion at 395 U.S. stores
- KMart breach - More cloned cards on their way?
- New Net Technologies Letter To The Editor Of Retail Systems
- PCI inertia maintains high cyber risk for retailers
- eBay Breach – A warning to consumers and retailers about the importance of Password Policy
- Hacker battles encryption, nabs card info from online retailer
-
White Papers
- State of California Data Security Breach Reporting
-
SOX Compliance
-
Blog
- New York State Reveals New Cybersecurity Regulations for Financial Industry
- Lloyds Bank Knocked Offline in DDoS Attack
- Heads up Finance Industry- Key Threats to Look Out For in 2016
- IBM Finds Human Error the Leading Cause of Data Breaches
- New York Financial Sector Considering New Cyber Security Rules
- Articles
-
Blog
-
Compliance Resources
- White Papers
-
Articles
- DISA-STIG
-
PCI DSS Compliance
- PCI DSS 2018: What Does the Future Hold?
- PCI DSS- The Present & Future
- PCI – Going Beyond the Standard: File Integrity Monitoring
- Customer is King, but what do they want when it comes to online Security?
- PCI DSS POS breach: Do you allow 3rd party access to your systems or provide IT services to customers with Governance, Risk Management and Compliance responsibilities?
- Is Your QSA Making You Less Secure?
- PCI DSS Version 3 and File Integrity Monitoring – New Standard, Same Problems
- File Integrity Monitoring - View Security Incidents in Black and White or in Glorious Technicolor?
- FIM for PCI DSS - Card Skimmers Still Doing the Business After All These Years
- Tokenization, the PCI DSS and the Number One Threat to Your Organization's Data
- SOX
- HIPAA HITECH
- FedRAMP
- NERC CIP
- NIST 800-53
- NIST 800-171
- COBIT-ITIL-ISO27001
- General Data Protect Regulation GDPR
- Webinars
-
Case Studies
- NERC CIP
-
PCI DSS Compliance
- Leading Payment Gateway Chooses NNT for PCI Compliance
- Payment Service Provider Passes PCI Audit With Change Tracker Gen7 R2
- PCI Compliance via a 'Homeostatic Equilibrium' - Miles Technologies
- NNT Gets ABRSM in Tune with PCI DSS
- NAFSA is Well Educated and Learned in PCI DSS Compliance
- Biaggi's Ristorante Italiano Order NNT Change Tracker to Satisfy PCI Hunger
- Harrods Selects NNT Change Tracker for PCI DSS Compliance
-
Blog
-
PCI DSS Compliance
- Thousands of Online Shops Hit by Magecart Attack
- Apps Used to Book Hotels Targeted by Skimming Attack
- 23 Million Stolen Debit and Credit Cards Found on the Dark Web
- Magecart Attack Hits 960 e-Commerce Stores
- PoS Systems Infected with Malware at Checkers and Rally's Restaurants
- PoS Systems Infected with Malware at Checkers and Rally's Restaurants
- Wendy’s Reaches $50 Million Settlement over Payment Card Breach
- Huddle House Restaurant Chain Suffers POS Malware Breach
- Sotheby’s Website Infected with Magecart for 19 Months
- Cheddar’s Scratch Kitchen Breach Hits Over Half a Million Customers
- Chili’s Suffers Payment Card Breach
- Travel Booking Giant Orbitz Suffers Data Breach
- Applebee’s Chain Hit with Payment Card Breach
- Forever 21: Payment Systems Breached for Seven Months
- Beware: 50 Million Global Fraud Attempts Expected Next Week
- Hyatt Hotels Suffers from Another Card Data Breach
- Half of Orgs Failing in PCI Compliance
- Cinema Chain Suffers Possible Two Year POS Breach
- Restaurant Chain Chipotle Finds Suspicious Activity on POS System
- Here we go again: Intercontinental Hotels Suffers Major Card Breach
- PoS Breach Hits Select Restaurants Across the US
- Fraudulent Credit Card Purchases Now Burden Retailers Slow to Upgrade Payment Terminals
- Trump Hotels Investigating Yet Another Data Breach
- Home Depot Settles Lawsuit over 2014 Data Breach
- Wendy’s Breach Expected to Surpass the Losses of Target & Home Depot
- Going Digital- Replacing Cards with Smartphones
- The State of PCI Security
- Landry’s Announces List of Restaurants & Venues Affected by POS Breach
- Hyatt Hotels- Latest Victim of POS Malware Attack
- Heads up Retailers- Consumers Won’t Shop with Breached Businesses
- Highly Sophisticated ModPOS Malware Spotted
- 54 Starwood Hotel Establishments Infected with POS Malware
- Retailers Growing Frustrated by Push Back From Banking Industry
- Point-of-Sale Breach at Peppermill Resort Spa Casino
- FBI’s Chip-Based Credit Card PSA Removed after Complaints from Banks
- Surge in Fraudulent Debit Card Transactions at United States Walmarts
- Debit Cards Falling Behind Credit Cards in EMV Migration
- Malware Targets Pennsylvania Holiday Inn’s Computer System
- Contactless payment limit raised from £20 to £30
- Carphone Warehouse customer data breach investigated
- PCI DSS- Detroit Zoo One of Many Affected by SSA Breach
- CVS investigating possible payment card breach
- What does the future hold for the payment card industry?
- eBay e-commerce platform under attack
- PCI Council launches group to help improve SME compliance
- Attacks on Point of Sale systems are racking up huge losses for companies
- Sally Beauty May Have Suffered a Second Security Breach
- PCI gives 14 months to fix high risk SSL problem
- PCI DSS 3.1 Forces Move From SSL to TLS
- Change Tracking for PCI DSS Compliance
- 3 new breaches reported: Hotel POS systems infected with malware, Aquarium supplies website compromised and a POS Systems provider investigates card data theft from its customers’ systems
- TalkTalk's hacked customer data: A feast for fraudsters and phishing scammers
- 3 new breaches – a hacked eCommerce site, POS malware and a spear phishing attack
- Exposing a cyber criminal gang responsible for the theft of $100M's, credit cards and intellectual property
- Established telecom company chooses New Net Technologies to ensure PCI DSS compliance
- New breaches show every organization is potentially at risk and why file integrity monitoring would have helped
- New Net Technologies Letter To The Editor Of Retail Technology
- Moonpig app pulled over security fears
- Cyber attacks on retailers becoming more targeted - Is the PCI DSS V3 enough?
- Suspected POS breach at Chick-fil-A: Did the PCI DSS fail?
- Staples Breach - Bigger than expected
- More pressure on Retailers to confront cyber security threats - LusyPOS and Bebe Store Breach
- Why are retailers still falling prey to the same problem? It's time to spot the breach!
- Point-of-Sale Malware “d4re|dev1|” is Attacking Ticket Machines and Electronic Kiosks
- Union Bank Bags PCI DSS Certification
- Update on PSD2 – the PCI SSC view
- HSBC Acknowledges Massive Payment Card Breach
- Partnership brings PCI DSS compliance to Nigeria
- Staples payment card breach suspected - Has BlackPOS struck again?
- POS Protection - If Target didn’t concern you, maybe Home Depot will?
- PCI DSS: Best Practise to ensure compliance
- Dairy Queen confirms breach, Backoff malware intrusion at 395 U.S. stores
- KMart breach - More cloned cards on their way?
- New Net Technologies Letter To The Editor Of Retail Systems
- PCI inertia maintains high cyber risk for retailers
- eBay Breach – A warning to consumers and retailers about the importance of Password Policy
- Hacker battles encryption, nabs card info from online retailer
-
NIST 800 53
- Cybersecurity Certification Program for US Defense Contractors Expected in 2020
- Louisiana Declares State of Emergency Following Cyber Attack
- California State Auditor Finds Flaws in Government IT Systems
- U.S. State Department Failing to Address Cybersecurity Basics
- NIST Small Business Cybersecurity Act Signed into Law
- IIC Releases New IoT Endpoint Best Practice Guide
- Details Behind DoD Cybersecurity Scorecard 2.0 Released
- Wi-Fi Alliance Enhances Security Measures for 2018
- Report Finds Federal Websites Still Lack Basic Security Requirements
- NIST Issues New Cybersecurity Workforce Framework
- Trump Signs Cybersecurity Executive Order
- NIST Releases Guidelines to Enhance Email Security
- NIST Updates Telework Guidelines after 7 Years
- Humans- The Perfect Exploit in a Hackers Scheme
- Hackers 'stole data of millions of US government workers'
- Survey: 75 percent of companies have significant risk exposure
- Millions of US government workers hit by data breach
-
NIST 800-171
- U.S. Government Payment Provider Exposes 14M Records
- DoD Issues New Guidance to Drive NIST 800-171 Compliance
- Danish Railway Company Suffers DDoS Attack
- Cyberattack Proves Gas Pipelines Vulnerable to Attack
- IoT Security Spending Expected to Reach $1.5 Billion in 2018
- What You Risk by Not Guaranteeing NIST 800-171 Compliance
- Updates to NIST Cybersecurity Framework to be Revealed Spring 2018
- 21K Soldiers and Civilians Impacted by US Marines Data Breach
- DOJ Unveils New Cybersecurity Task Force
- Is Your Organization Ready for NIST 800-171?
-
DISA STIG
- South Korean Hosting Firm Pays Record-Setting $1 Million Ransom Demand
- NNT Awarded Army Certification of Networthiness Accreditation
- U.S. Aviation Authorities Recommend New Cybersecurity Measures
- Hacked Swedish Military Server Used in 2013 Financial Attacks
- UK Builds £40 Million Military Cyber Defense Center
- Chinese National Pleads Guilty to Hacking U.S. Defense Systems
-
NERC CIP
- US Energy Company Fined $10 Million for Cybersecurity Failures
- Port of San Diego Suffers Ransomware Attack
- House Passes Bill to Address Industrial Cybersecurity Threats
- U.S. Offers $25 Million Cybersecurity Grant after Recent Pipeline Attacks
- FERC Proposes Updates to NERC CIP Standard
- UK Firms Fear Cybersecurity Threats in Energy Sector
- Study Find 3,000 Industrial Sites hit by Non-Targeted Malware a Year
- US Oil and Gas Firms Falling Behind in Cyber Security Preparedness
- BlackEnergy Malware Linked to Ukrainian Power Outage
- Fictional APT attack on NorthEastern Energy grid predicts costs of $1T and 93 million left without power
- British Gas bows to criticism over blocking password manager
- Destructive Cyber-Attacks Blitz Critical Infrastructure
- NERC CIP compliance: Power grid under attack every four days - or is it more frequent?
- ICS-CERT: 38% of Breaches Used An 'Unknown' Access Vector
- NERC CIP 5 Update: Critical vulnerability found in Schneider Electric SCADA Gateway
- Steel Mill shut down by hackers - Does NERC CIP have a wider remit?
- BlackEnergy malware infects industrial control systems
- FedRAMP
-
HIPAA, HITECH
- Unprotected Medical Images and Data Belonging to Millions of Americans Found Online
- Wyoming Hospital Systems Down After Ransomware Attack
- IBM's Annual Cost of a Data Breach Report Released
- More Healthcare Firms Impacted by AMCA Breach
- Premera Blue Cross Agrees to Pay $10 Million to States over Data Breach
- Data Breach May Have Exposed Nearly 12 Million Quest Diagnostics Patients
- Study Finds Healthcare Orgs Failing on Cybersecurity Hygiene
- U.S. Attorneys General File First Multi-State HIPAA Related Lawsuit
- Anthem Agrees to $16m HIPAA Settlement
- Leading U.S. Healthcare Provider Hit by Targeted Phishing Attack
- Securing Electronic Health Records: What’s at Stake?
- 70% of Healthcare Organizations Suffer from Data Breaches
- New Study Claims Larger Healthcare Orgs are More Susceptible to Breaches
- Stolen Medical Data Becoming too Common for English Adults
- 400K Patient Records Exposed in January Healthcare Breaches
- Banner Health Warns 3.7 Million of Data Breach
- Pending New York Data Breach Legislation Could Affect PHI Security
- 98% of Leaked Healthcare Data Caused by Large Scale Attacks
- Is Your Health Data in the Right Hands?
- Healthcare Industry Still Falling Behind in IT Security Efforts
- United States Consumers Fearful of Cyber-Attacks
- Audit Finds Healthcare.gov Guilty of Weak Cyber-Security Practices
- Healthcare Institutions are Three Times More Likely to be Targeted for Cyber Attacks
- Encrypted medical databases shown to leak information
- NHS blunder breaches data on 3000 patients
- Security Stories to Watch: Data Breaches, Human Error and More
- HIPAA Compliance - New Resources to Further Reduce Cyber Security Risk to Healthcare Systems
- Epidemic of medical data breaches leaking our most sensitive information
-
Sarbanes-Oxley (SOX)
- New York State Reveals New Cybersecurity Regulations for Financial Industry
- Lloyds Bank Knocked Offline in DDoS Attack
- Heads up Finance Industry- Key Threats to Look Out For in 2016
- IBM Finds Human Error the Leading Cause of Data Breaches
- New York Financial Sector Considering New Cyber Security Rules
-
FDCC-USGCB
- 2 Million Michigan State Employees PII Exposed
- US Department of Defense Announces Launch of ‘Hack the Pentagon’ Bug Bounty Program
- U.S. Government Introduces New ‘National Background Investigation Bureau’
- Tim Cook Lashes Out During Meeting With US Government Over Encryption
- White House Officials Meet with Tech Giants to Discuss Fighting Terror
- COBIT, ITIL and ISO27001
- CESG
- State of California Data Security Breach Reporting
-
General Data Protection Regulation (GDPR)
- Italian Bank UniCredit Suffers Data Breach
- Report Finds Over Half of UK Orgs Still Not GDPR Compliance
- ICO Issues Huge Fines to British Airways, Marriott
- Facebook Urged to Provide Breach Details to UK Regulators Swiftly
- Data Breach Reports Have Quadrupled Under GDPR
- Update: Timehop Reveals More Personal Data was Compromised in Data Breach
- Facebook Fined £500,000 Over Cambridge Analytica Scandal
- Timehop Data Breach Hits 21 Million Users
- Latest NCSC Report Highlights Top Cyber Threats to UK Businesses
- Trend Micro Predicts Known Vulnerabilities will Plague 2018
- Third Party Cyber Incidents Costing Businesses Millions
- Pizza Hut Customers Enraged by Delayed Breach Notification
- 1.9 Million Records Compromised First Half of 2017
- UK Retail Breaches Double in the Last Year
- UK Government Will Invest £21 Million in NHS Cybersecurity
- Cloud Services Falling Behind in GDPR Migration
- New Breach Guidelines Issued by European Banking Authority
- EU’s New ‘General Data Protection Regulation’
- Number of Stolen Credentials Skyrockets 141% in North America
- 2.2 Million Dow Jones Customers Impacted by Exposed Data
- China’s New Cybersecurity Law Takes Effect on Thursday
- Experts Focus on Potential Security Threats for 2017
- New York Governor Proposes Harsher Cyber Security Punishments
- Sensitive UK Government Data for Sale on Darknet
- Cyber-crime empties pockets of UK businesses
- US University to spend $3 million on cyber security
- Hackers trade on inside information to net $100m
- Council data security 'shockingly lax'
- Serious flaw allowed security bypass on Italian visa site
- Security compliance is still a corporate headache
- Cost of a data breach: 58 cents per record, says Verizon
- The Security Industry’s Biggest Challenges
- Don't delegate cyber risk management responsibility
- FTSE 350 firms still have long way to go on cyber risk
- Starting up: the business co-founders in different countries
- The Snappening - News of a Snapchat 'breach'
-
PCI DSS Compliance
- Press Releases
-
Breach Detection - Host Intrusion Detection
-
Breach Detection Resources
-
Blog
- Airbus Hit by Cyber Attacks on Multiple Suppliers
- 400 Million Facebook Users' Phone Numbers Exposed
- Hy-Vee Point-of-Sale Systems Suffers Security Breach
- European Central Bank Website Hacked
- 700K Guest Records Stolen in Choice Hotels Breach
- Singapore Government takes action on Cyber Security & Data Protection standards across the public sector
- US Online Retailer CafePress May Have Exposed Customer Data
- Capital One Hit by Massive Data Breach
- Why Open Port Monitoring is Both an Essential and Flawed Security Control
- Why Open Port Monitoring is Both an Essential and Flawed Security Control
- Marriott Starwood Hotels Breach: Details on 500 Million Guests Compromised
- FBI & DHS Issue Warning: RDP Attacks are on the Rise
- Is Patching a Double-Edged Sword?
- Facebook to Notify 87 Million Users Impacted by Data Breach
- Details on 150 Million MyFitnessPal Users Leaked
- Report: 58% of Healthcare Security Breaches Involve Insiders
- SEC Issues New Guidelines for Disclosing Cybersecurity Risks
- Pennsylvania City Struggles to Remediate $1 Million Cyber Attack
- White House Releases Report Detailing Cost of Cyber Attacks
- DHS Confirms Privacy Breach Involving a Quarter Million Employees
- The Hacks that Hurt us the Most in 2017
- Jail Time for Concealing Data Breach Proposed by Senate Democrats
- Study Finds Insider Threats Present a Serious Threat to Organizations
- Forever 21 Confirms POS Data Breach
- DHS Notifies States Affected by Russia Election Hack
- FedEx Reports $300M in Losses Due to NotPetya Attack
- NotPetya Attack Costing Organizations Millions in Losses
- UK Government Seeks Stricter Guidelines for Smart Cars
- Virgin America Airline Hit with Data Breach
- Fatboy Ransomware-as-a-Service Bases Ransom Amount on Victim Location
- Cyber Attack Sets off 156 Emergency Alarms in Dallas
- Germany to Launch Cyber Command Center
- Almost Half of UK Firms Have No Cyber Security Strategy
- Companies Blame DDoS Attacks on Competitors
- Verizon Cuts $300M off Yahoo Offer While Yahoo Issues Another Breach Warning
- UK Hit by Nearly 200 Possibly Devastating Cyber Attacks in Three Months
- Trump Selects Giuliani as Cybersecurity Advisor
- Half of IT Pros Consider Insiders Threats More Dangerous than Hackers
- Yahoo Acquisition Uncertain as More Details in Data Breach Emerge
- City of London Hit by More Ransomware Attacks than Some Countries
- Cyber Ignorance Costing UK Businesses £1 Million
- 500 Million Yahoo Accounts and Counting Breached in State Sponsored Attack
- Wendy’s POS Data Breach Jumps to 1K Franchise Locations
- Third-Party Vendor Compromises State Farm Customer Data
- UK Manufacturing Industry Urged to Improve Cyber Security Posture
- 1.5 Million Verizon Enterprise Solutions Customers’ Information Breached
- Tech Giants like FB & Google Beefing up Data Security Methods Amid Encryption Debate
- Major Florida University Hit with Data Breach
- University of Virginia Data Breach Linked to Employee Tax Fraud
- 320,000 Time Warner Customers Emails & Passwords Compromised
- Suspected VTech Hacker Arrested in UK
- British Pub Chain Hit by Hackers- Experienced Massive Data Breach
- Educational Toy Maker VTech Breach Affects Millions of Parents & Children
- 6 Million Georgia Voters Victim of Latest Data Breach
- Chancellor George Osborne Announces Plans to Double Spending to Fight Cybercrime
- TalkTalk breached again - and this may be the biggest one yet
- Kmart Australia Suffers From Privacy Breach
- Russian hackers breached 97 websites in past two months
- Mumsnet hit again, this time by stronger series of attacks
- Thomson data breach exposes hundreds of customer details
- Mumsnet's co-founder suffers 'swatting attack'
- The Latest Cyber Fraud Victim- Ubiquiti Networks
- The only way to win the internet war
- Who is Winning the Internet Security War?
- Online cards company Moonpig breached again
- United reportedly hacked by same group that breached Anthem
- Cyber-attacks Hit Businesses Daily but Resilience is Lacking
- EU faces increased Russian cyber-threat
- Darkode Hacking Forum Goes Dark
- Government offers 5k grant scheme for SMEs cyber security
- Cyber attack on US power grid could cost country $1tn
- Quantum leap: Untangling Toshiba's 'unbreakable' encryption
- Password manager LastPass breached, data compromised
- UK Firms Face £34bn Bill From Cyber-Attacks
- 2015 Information security breaches survey
- Hackers access 100,000 IRS accounts in data breach
- Over one million hit by hack at CareFirst Blue Cross Blue Shield
- New lessons in UK schools to focus on cyber skills
- Study shows C-level execs need to increase cyber security literacy
- CIOs see security budget increase to tackle cyber threat
- Investors Lose Interest in Breached Companies
- Closing the Loop
- Deceptive Chrome Extension Steals More Than A Million Users' Data
- Linux Australia Conference Delegate Data Exposed
- DDoS increasingly used in advanced cyber-attacks
- Anthem Inc Breach – Hijacked credentials used for ‘sophisticated’ attack
- Sony Pictures Breach – What it means for everyone (not just those satirizing Supreme leaders of communist states)
- You can’t always stop a breach: but you should always be able to spot one
- UK firms consider hiring ex-hackers to solve skills shortage
- Operation DeathClick: Want to attack a specific target? The winning bidder will be granted access!
- Phishing attacks explode and executives are taking the bait
-
Articles
- A Look Back at the Biggest Data Breaches of 2016
- Historic Yahoo Data Breach: 1 Billion Accounts Compromised
- Why Corporate Security Fails- A Focus on Leadership
- Global Cyber Security Spending to Reach $82 Billion This Year
- Average Cost of Data Breach Spikes to $4 Million in 2016
- Cybercrime: The Leading Cause of Data Breaches in Healthcare
- 2015 Data Breach Review
-
Blog
-
Breach Detection Resources
-
Vulnerability Scanning and Remediation
- White Papers
- Articles
-
Blog
- Health Data Belonging to 1 Million New Zealanders at High Risk of Compromise
- Remote Access Vulnerabilities Found in Popular IoT Devices and Routers
- Google Reports Massive iPhone Security Flaw
- 34% of Vulnerabilities Reported in First Half of 2019 Remain Unpatched
- Researcher Warns of Airlines Failing to Protect Customer Data
- US Coast Guard Reveals Large Vessel Suffered a Cyber Attack
- Vulnerability Scans Are a Lot Like Eating Mushrooms
- When Old News is More Dangerous Than Fake News: Vulnerability Scan Blindspots
- XP Support Has Ended - Breach Prevention and Host Intrusion Detection Have Never Been More Valuable
- When is a vulnerability not a vulnerability?
-
Tripwire® Alternative
- Articles
-
Case Studies
- Tripwire® Alternative: Telecom Company Switches From Tripwire® to NNT
- LiveTV Migrated From Tripwire® Enterprise to NNT Change Tracker
- Europe’s Favourite Low Fares Airline Trialled Both Tripwire® and NNT Solutions for FIM and SIEM
- Universal Studios Orlando Successfully Migrated From Tripwire® Enterprise and Tripwire® Log Center to NNT Change Tracker and NNT Log Tracker
- White Papers
- Blog
-
Ransomware
-
Blog
- Major US Hosting Provider Hit by Ransomware
- Ransomware Attack Takes Down German Automation Giant
- Global Shipping Giant Pitney Bowes Hit by Ransomware Attack
- Hearing Aid Giant Demant Warns of Extreme Losses Due to Ransomware Attack
- Senate Passes New Ransomware Law
- New Zealand Businesses and Citizens Report Record Losses Due to Cybercrime
- NATO - Cyber Attack on One Will Trigger Full NATO Response
- Trend Micro Releases 2019 Mid Year Security Roundup
- 23 Local Government Entities in Texas Hit With Ransomware Attacks
- City of Naples Suffers Losses from Spear-Phishing Attack
- LA Governor Declares State of Emergency After School Districts Suffer Cyber Attacks
- Second Florida City Struck by Ransomware to Pay Off Hackers
- Florida City Pays $600K to Re-Gain Access to Systems After Ransomware Attack
- 2 Years after WannaCry Outbreak, Millions Still Remain at Risk
- Matrix-Themed Ransomware MegaCortex Spreads
- Mondelez Sues Zurich over NotPetya Payout Dispute
- Shipping Giant COSCO Hit by Ransomware Attack
- New Ransomware Variant Includes Cryptocurrency Mining Capabilities
- Cybercrime Losses in 2017 Exceed $1.4B
- City of Atlanta Spending Tops $2.7 Million in Ransomware Remediation
- Boeing Computer Systems Hit by WannaCry Ransomware
- City of Atlanta Hit by Ransomware Attack
- McAfee Finds Increase in Fileless Malware, Cyber Attacks Targeting Health Providers
- Five Eyes Nations Blame Russia for NotPetya Attack
- 19 Million Californians Voter Records Held for Ransom
- US Blames North Korea for WannaCry Cyber Attack
- Are we too Busy with Pancakes to get Serious about Ransomware?
- Ransomware Targeting Business Users Increases to 26%
- Two-Thirds of Orgs Running Out of Date Office Software
- UK Government Points Blame to North Korea for WannaCry Incident
- Oh KRACK! What We Know About Today’s Massive Wi-Fi Security Flaw
- New Crypto-Ransomware Attacks 20 Million Inboxes
- NHS Scotland Org Suffers Second Ransomware Attack
- Ransomware: The Great White Shark of Malware- WannaCry Update
- Study Finds Public Cloud More Secure than Private or Hybrid Cloud
- If WannaCry Didn’t Scare You, Maybe Petya Will
- Windows XP Spotted on the HMS Queen Elizabeth
- Honda Forced to Shut Down Plant After WannaCry Infects Network
- WannaCry Ransomware Didn’t Start with Phishing Attacks
- WannaCry Strikes Back with New Variants
- NHS Hit by Massive Cyber Attack
- Election Themed Spam on the Rise Following US Presidential Race
- Ransomware: The Great White Shark of Malware and What You Need to do About it
- White Hats Work Together to Fight Todays Ransomware Threat
- FBI Issues New Ransomware Alert Amid Utility Hack
- Locky Ransomware Becomes More Evasive Than Ever Before
- Cloud Apps Vulnerable to Unsecured Ransomware Attacks
- New Locky Ransomware Spreading Like Wildfire
- Hollywood Hospital Held for Ransom by Hackers
- Ransomware Cripples County Council for Nearly a Week
- 'British Gas' and 'Home Office' email ransomware warning
- One third of UK companies beset by ransomware
- Videos
- Webinars
- White Papers
- Articles
-
Blog
- Greenbone - Reseller
- Carahsoft - Government Solution Provider
- Services
- Industries
-
Resources
-
Blog
-
File Integrity Monitoring
- American Gunmaker Smith & Wesson Hacked in Magecart Attack
- Macy's Online Shoppers Hit by Magecart Data Breach
- Media Giant Nikkei Losses $29m in BEC Scam
- Monetization of IoT Cyber Attacks on the Rise
- DDoS Attack Knocks Parts of Wikipedia Offline
- Organizations Insufficiently Securing IoT and IIoT Devices
- Looking for the Magic Quadrant for FIM/File Integrity Monitoring?
- Scammers Nab $2.5 Million from North Carolina County through BEC Scam
- BEC Scams Cost US Orgs $300m Per Month
- Beware of Phishing Scams during Amazon Prime Day
- 66% of North American Homes Have Multiple IoT Devices
- Cyber-Security Of The Fridge: Assessing The Internet Of Things Threat
- Triton Malware Found Inside Second CNI Facility
- Cybercriminals Outspend Organizations in Uphill Cybersecurity Battle
- Virginia Bank Hit by Coordinated $2.4M ATM Attack
- BEC Scams Costing Orgs Over $12 Billion in Losses
- U.S. Government Warns of North Korean APT Malware
- U.S. Disrupts Russian Botnet of 500,000 Infected Routers
- Sears, Delta Air Lines Report Customer Data Breach
- Three-Quarters of Orgs Experienced Phishing Attacks in 2017
- A Look into the Future: 2018 Malware Predictions
- Over 400M Malware Infections Detected in Q3
- Chinese KeyBoy Group Spotted Targeting Western Organizations
- Nearly 75% of Security Incidents Originate Inside the Extended Enterprise
- CCleaner Server Compromised in Beginning of July
- Study Finds Organizations Doing Little to Protect Against Insider Threats
- Lithuanian Man ‘Whales’ 2 U.S. Tech Companies out of $100 Million
- WikiLeaks Exposes CIA Tools for Stealing SSH Credentials
- U.S. Fashion Retailer Suffers Malware Infection on PoS Systems
- OneLogin Reports Unauthorized Access Issue
- Google Phishing Attack Targeted Permissions & Credentials
- Australian ISP Suffers DDoS Attack
- Spammers Caught Red Handed After 1.4 Billion Email Addresses Leaked Online
- Kids’ Voice Messages Exposed in CloudPets Data Breach
- TeamSpy Malware Strikes Again to Steal Data
- InterContinental Hotels Confirms Breach at 12 Hotels
- Best Practice Guide Offers Security Advice to Boards of Directors
- Report Finds Stark Increase in Number of U.S. Data Breaches
- UK Commits to Ground Breaking Cyber Security Strategy
- 3.2 Million Payment Card Details Leaked in Massive India POS Breach
- FBI Asks Ransomware Victims to Come Forward and Share their Experiences
- HEI Hotels & Resorts POS Systems Plagued by Malware
- Study Finds Majority of Organizations have Suffered from Data Loss or Theft in the Past 2 Years
- U.S. Olympian Michael Phelps Targeted by Hackers in DDoS Attack
- Interbank Payments Become Fraudsters Latest Targets
- Landmark Email Privacy Case Overturned in Favor of Microsoft
- Pokémon Go Sparks Controversy over Privacy & Security
- Security Pros Concerned about the Future of DDoS Ransom Threats
- FBI Claims Business Email Compromise Scams Tops $3.1 Billion
- The Bank Vault Isn’t Secure: So What Hope Do the Rest of Us Have?
- High-Profile News Outlets Suffer From Malvertising Attacks
- 2016 Tax Fraud Estimated to Exceed $21 Billion
- Cybercriminals Targeting Finance Departments with Malicious Emails
- DDoS Learning Curve - How to Better Protect Yourself
- FBI Warns Holiday Shoppers of Too Good to be True Deals this Season
- Learn How to Spot Malicious Activity as Soon as it Happens
- Thousands of Lloyds customers have personal data stolen
- 3/4 of UK Businesses Not Confident Detecting Data Breaches
- Security breaches - hiding in plain sight
- Hacking Team identity linked to Gamma International attack
- Ransomware, Phishing And Spam Attacks Hit New Highs
- Overly complex IT security solutions put companies at risk
- UK Breach Costs Rise 7% Over Two Years
- SMEs not protecting themselves against cybercrime
- Phishing in the C-Suite: Executives Vulnerable to Attacks
- DDoS Attack Study Shows U.S. Companies Better Equipped for Cyber Security Issues
- If you can’t stop the breach, at least spot the breach
- Fighting Against Change
- Hiding in Plain Sight
- Almost half of firms will plan for cyber-attack disruption by 2018
- Gemalto investigates claims of hacking by NSA and GCHQ
- More on Carbanak APT - The $1B Cyber Crime
- Ransomware Website attack anatomy exposed – Essentials tips for Web Application protection
- Book2park.com breach uncovered – how big is the breach and how did it happen?
- If antivirus technology only detects half of all malware, what will you do about the other half it ignores?
- Skeleton Key AD malware asks tough questions about how you manage security for your organization
- Will 2015 be the year of DDOS Extortion? New trojan out to attack Linux platforms
- All I want for Christmas is security
- Hackers Lurked Undetected Inside Electronic Payment Solutions Provider Since 2009
- Sony Breach - What we now know
- Welcome To My Cyber Security Nightmare
- Hackers breach the White House
- Not just NNT saying that file integrity monitoring is key...
- Backoff malware targeting POS Systems - Sharp rise in Q3 infections
- 2014 iDefense Report – Not just NNT saying you should implement File Integrity Monitoring
- IT Security Tops Christmas Lists with 41% of Businesses Increasing Their Budget
- Tackling The Generation Gap In Cyber Security – Echoing NNT Concerns
- The Last Rites of Traditional IT Security
- IT Security Industry To Expand Tenfold
-
Breach Detection
- Airbus Hit by Cyber Attacks on Multiple Suppliers
- 400 Million Facebook Users' Phone Numbers Exposed
- Hy-Vee Point-of-Sale Systems Suffers Security Breach
- European Central Bank Website Hacked
- 700K Guest Records Stolen in Choice Hotels Breach
- Singapore Government takes action on Cyber Security & Data Protection standards across the public sector
- US Online Retailer CafePress May Have Exposed Customer Data
- Capital One Hit by Massive Data Breach
- Why Open Port Monitoring is Both an Essential and Flawed Security Control
- Why Open Port Monitoring is Both an Essential and Flawed Security Control
- Marriott Starwood Hotels Breach: Details on 500 Million Guests Compromised
- FBI & DHS Issue Warning: RDP Attacks are on the Rise
- Is Patching a Double-Edged Sword?
- Facebook to Notify 87 Million Users Impacted by Data Breach
- Details on 150 Million MyFitnessPal Users Leaked
- Report: 58% of Healthcare Security Breaches Involve Insiders
- SEC Issues New Guidelines for Disclosing Cybersecurity Risks
- Pennsylvania City Struggles to Remediate $1 Million Cyber Attack
- White House Releases Report Detailing Cost of Cyber Attacks
- DHS Confirms Privacy Breach Involving a Quarter Million Employees
- The Hacks that Hurt us the Most in 2017
- Jail Time for Concealing Data Breach Proposed by Senate Democrats
- Study Finds Insider Threats Present a Serious Threat to Organizations
- Forever 21 Confirms POS Data Breach
- DHS Notifies States Affected by Russia Election Hack
- FedEx Reports $300M in Losses Due to NotPetya Attack
- NotPetya Attack Costing Organizations Millions in Losses
- UK Government Seeks Stricter Guidelines for Smart Cars
- Virgin America Airline Hit with Data Breach
- Fatboy Ransomware-as-a-Service Bases Ransom Amount on Victim Location
- Cyber Attack Sets off 156 Emergency Alarms in Dallas
- Germany to Launch Cyber Command Center
- Almost Half of UK Firms Have No Cyber Security Strategy
- Companies Blame DDoS Attacks on Competitors
- Verizon Cuts $300M off Yahoo Offer While Yahoo Issues Another Breach Warning
- UK Hit by Nearly 200 Possibly Devastating Cyber Attacks in Three Months
- Trump Selects Giuliani as Cybersecurity Advisor
- Half of IT Pros Consider Insiders Threats More Dangerous than Hackers
- Yahoo Acquisition Uncertain as More Details in Data Breach Emerge
- City of London Hit by More Ransomware Attacks than Some Countries
- Cyber Ignorance Costing UK Businesses £1 Million
- 500 Million Yahoo Accounts and Counting Breached in State Sponsored Attack
- Wendy’s POS Data Breach Jumps to 1K Franchise Locations
- Third-Party Vendor Compromises State Farm Customer Data
- UK Manufacturing Industry Urged to Improve Cyber Security Posture
- 1.5 Million Verizon Enterprise Solutions Customers’ Information Breached
- Tech Giants like FB & Google Beefing up Data Security Methods Amid Encryption Debate
- Major Florida University Hit with Data Breach
- University of Virginia Data Breach Linked to Employee Tax Fraud
- 320,000 Time Warner Customers Emails & Passwords Compromised
- Suspected VTech Hacker Arrested in UK
- British Pub Chain Hit by Hackers- Experienced Massive Data Breach
- Educational Toy Maker VTech Breach Affects Millions of Parents & Children
- 6 Million Georgia Voters Victim of Latest Data Breach
- Chancellor George Osborne Announces Plans to Double Spending to Fight Cybercrime
- TalkTalk breached again - and this may be the biggest one yet
- Kmart Australia Suffers From Privacy Breach
- Russian hackers breached 97 websites in past two months
- Mumsnet hit again, this time by stronger series of attacks
- Thomson data breach exposes hundreds of customer details
- Mumsnet's co-founder suffers 'swatting attack'
- The Latest Cyber Fraud Victim- Ubiquiti Networks
- The only way to win the internet war
- Who is Winning the Internet Security War?
- Online cards company Moonpig breached again
- United reportedly hacked by same group that breached Anthem
- Cyber-attacks Hit Businesses Daily but Resilience is Lacking
- EU faces increased Russian cyber-threat
- Darkode Hacking Forum Goes Dark
- Government offers 5k grant scheme for SMEs cyber security
- Cyber attack on US power grid could cost country $1tn
- Quantum leap: Untangling Toshiba's 'unbreakable' encryption
- Password manager LastPass breached, data compromised
- UK Firms Face £34bn Bill From Cyber-Attacks
- 2015 Information security breaches survey
- Hackers access 100,000 IRS accounts in data breach
- Over one million hit by hack at CareFirst Blue Cross Blue Shield
- New lessons in UK schools to focus on cyber skills
- Study shows C-level execs need to increase cyber security literacy
- CIOs see security budget increase to tackle cyber threat
- Investors Lose Interest in Breached Companies
- Closing the Loop
- Deceptive Chrome Extension Steals More Than A Million Users' Data
- Linux Australia Conference Delegate Data Exposed
- DDoS increasingly used in advanced cyber-attacks
- Anthem Inc Breach – Hijacked credentials used for ‘sophisticated’ attack
- Sony Pictures Breach – What it means for everyone (not just those satirizing Supreme leaders of communist states)
- You can’t always stop a breach: but you should always be able to spot one
- UK firms consider hiring ex-hackers to solve skills shortage
- Operation DeathClick: Want to attack a specific target? The winning bidder will be granted access!
- Phishing attacks explode and executives are taking the bait
- Event Log Management
-
Device Hardening
- Microsoft and NIST Partner to Create Enterprise Patching Guide
- FDA Issues Warning over Vulnerabilities in Medical Devices
- System Hardening, and Why it's Harder Than it Looks
- Is system hardening like an appendectomy?
- $700 Million Settlement Reached in 2017 Equifax Data Breach
- Freedom Mobile Exposes Details of Customer Payment Card Data
- Ransomware Attack Takes Down City of Del Rio
- UK Government Unveils “World First” IoT Code of Practice
- Google Shutting Down Google+ Platform Following Privacy Vulnerability
- Bristol Airport Hit by Ransomware Attack
- Equifax Signs Consent Order with 8 States Following Data Breach
- DNA Testing Firm MyHeritage Leaks Data on 92 Million Users
- Mirai IoT Malware Success Highlights Dangerous Security Threats
- UK Government Reveals New IoT Best Practices
- New IoT Botnet Targets Financial Sector
- New Details Released on Top 10 Vulnerabilities Exploited by Cybercriminals
- GitHub Hit by Largest DDoS Attack Ever Recorded
- 32 Lawsuits Filed Against Intel for CPU Security Flaws
- Equifax Breach Gets More Complicated as New Details Surface
- Microsoft Issues Emergency Fix for Meltdown Vulnerability
- Major ‘Meltdown’ and ‘Spectre’ CPU Security Flaws Discovered
- California Voter Information Published on Dark Web
- Mirai Attackers Plead Guilty
- DDoS Attacks Spike by 91% since Q1 2017
- Equifax Profits Drop 27 Percent Following Data Breach
- US Senators Introduce SAVE Act to Protect Election System
- DDoS Attack Knocks Czech Election Sites Offline
- New Botnet Targets Improperly Secure IoT Devices
- PwC Security Survey Shows Orgs Still Struggling to Build Cyber Resilience
- Accenture Exposes Sensitive Data in AWS Misconfiguration
- Equifax CSO & CIO Resign Following Patch Neglect
- Equifax Ignored Patch 2 Months Prior to Hack
- Cyber-Security of the Fridge: Assessing the Internet of Things Threat- Update
- 1.2 Million NHS Patient Names Exposed in Data Breach
- DDoS Attacks Surge in Q2
- US Senators Introduce Bipartisan IoT Security Bill
- Game of Thrones Script Leaked After HBO Suffers Data Breach
- University College London Hit by Ransomware Attack
- Hackers Expose 17 Million Zomato User Credentials on the Dark Web
- Confidential Messaging App Confide Riddled with Security Vulnerabilities
- Consumer Reports Expected to Include Cyber Security in Product Reviews
- Luxury Austrian Hotel Hit by Ransomware Attack
- U.S. Election Assistance Commission Hacked by Russian Hacker
- Massive DDoS Attack Cripples Popular Websites for Large Part of Friday
- St. Jude Medical Denies Device Vulnerability Allegations
- Cloud Adoption Continues to Grow While Security Lags
- Study Finds Organizations are Severely Lacking in Privileged Account Management
- TalkTalk Still Suffering the Aftermath of Catastrophic Data Breach
- Watch Out FedEx Customers- The Bad Guys Are Coming!
- World's biggest maker of routers fighting new cyber attack
- The Carphone Warehouse attack: a wake-up call to UK business
- TV5Monde in chaos as breach costs roll into the millions
- Mozilla blocks Flash after Hacking Team incident
- Dangerous Apple 0-Day Exposes App Credentials
- Timeline of the World's Biggest Data Breaches
- DDoS attacks affecting more countries than ever before
- Bettys Tea Shop loses 122,000 records in data breach
- Data breaches to cost businesses $2.1 trillion by 2019
- RussianDoll hackers exploit Adobe and Windows zero-days
- UK firms horribly unprepared for data breach response
- Xbox Live downed by new DDoS attack
- Batten down the hatches! Looking at ways to enhance protection against ransomware, APTs and other phishing malware
- Defending against DDOS
-
CIS Benchmark
- Reported Security Breaches Skyrocket in Canada Following New Privacy Law
- Senators Urge Investigation into AWS Following Capital One Breach
- DLA Piper to Sue Insurer over NotPetya Claim
- Typeform, Popular Survey Software, Data Breach Hits Several Organizations
- Cyber Incidents Doubled in 2017
- Whole Foods the Latest Victim of Payment Card Data Breach
- VMWare API Abused to Access Guest Operating Systems
- Industroyer Malware Said to be Linked to Kiev Attack
- Cyberattacks Using Exploits up by 25 Percent in 2016
- Attention Hospitality Industry- Protect your Point-of-Sale Systems!
- Home Depot to Pay an Additional $25 Million in Data Breach Settlement
- CIS Security Controls Continue to Gain Mainstream Adoption
- Audit Finds Western Australian Government Failing to Protect Sensitive Data
- Data Security- A Learning Process
- Prioritizing Patch Management Critical to Security
- Harden 2012R2....and keep it that way!
- Why we all need better password policies - United Airlines' MileagePlus accounts plundered
- NNT awarded new CIS Security Software Certifications
- NNT now an Official OVAL Adopter - Here’s an acronym-fest to celebrate - OVAL, XCCDF, CIS, CVE, CCE, CVSS, DISA STIG & NVD!
-
CIS Controls
- UK Card Fraud Accounts for Half of All Losses Across Europe
- Your Best Bet for a Safe Ride? Buckle Up with a Best Practice Security Framework
- CafePress Faces Class-Action Lawsuit Following Data Breach
- Cyber Attacks on UK Businesses Soar 243%
- DoorDash Confirms Data Breach Impacting 4.9 Million Users
- Study Finds Majority of Port Vulnerabilities are Found in Three Ports
- Research Finds Almost 20% of Orgs Still Running Windows 7
- SMBs Lack the Resources, Technology, and Visibility Needed to Protect Organizations
- Federal Agencies are Failing at Cyber Security Basics
- Equifax Has Spent $1.35 Billion on 2017 Data Breach Costs
- Reddit Locks User Accounts Due to ‘Security Concern’
- Understanding the Basic CIS Controls: CSC 1-6
- Implementing the CIS Controls to Fight Against the Evolving Threat Landscape
- Bank of Chile Loses $10 Million in Recent Cyber Attack
- 1 Year Since WannaCry: What Have We Learned?
- Trump’s Cyber Security Advisers Resign in Light of Growing Cyber Threats
- UK Gov Claims UK Charities Vulnerable to Cyber Attacks
- LG Hit with Ransomware Identical to WannaCry
- Study Finds Orgs Have Yet to Improve Security Hygiene since WannaCry & Petya
-
Compliance
-
PCI DSS Compliance
- Thousands of Online Shops Hit by Magecart Attack
- Apps Used to Book Hotels Targeted by Skimming Attack
- 23 Million Stolen Debit and Credit Cards Found on the Dark Web
- Magecart Attack Hits 960 e-Commerce Stores
- PoS Systems Infected with Malware at Checkers and Rally's Restaurants
- PoS Systems Infected with Malware at Checkers and Rally's Restaurants
- Wendy’s Reaches $50 Million Settlement over Payment Card Breach
- Huddle House Restaurant Chain Suffers POS Malware Breach
- Sotheby’s Website Infected with Magecart for 19 Months
- Cheddar’s Scratch Kitchen Breach Hits Over Half a Million Customers
- Chili’s Suffers Payment Card Breach
- Travel Booking Giant Orbitz Suffers Data Breach
- Applebee’s Chain Hit with Payment Card Breach
- Forever 21: Payment Systems Breached for Seven Months
- Beware: 50 Million Global Fraud Attempts Expected Next Week
- Hyatt Hotels Suffers from Another Card Data Breach
- Half of Orgs Failing in PCI Compliance
- Cinema Chain Suffers Possible Two Year POS Breach
- Restaurant Chain Chipotle Finds Suspicious Activity on POS System
- Here we go again: Intercontinental Hotels Suffers Major Card Breach
- PoS Breach Hits Select Restaurants Across the US
- Fraudulent Credit Card Purchases Now Burden Retailers Slow to Upgrade Payment Terminals
- Trump Hotels Investigating Yet Another Data Breach
- Home Depot Settles Lawsuit over 2014 Data Breach
- Wendy’s Breach Expected to Surpass the Losses of Target & Home Depot
- Going Digital- Replacing Cards with Smartphones
- The State of PCI Security
- Landry’s Announces List of Restaurants & Venues Affected by POS Breach
- Hyatt Hotels- Latest Victim of POS Malware Attack
- Heads up Retailers- Consumers Won’t Shop with Breached Businesses
- Highly Sophisticated ModPOS Malware Spotted
- 54 Starwood Hotel Establishments Infected with POS Malware
- Retailers Growing Frustrated by Push Back From Banking Industry
- Point-of-Sale Breach at Peppermill Resort Spa Casino
- FBI’s Chip-Based Credit Card PSA Removed after Complaints from Banks
- Surge in Fraudulent Debit Card Transactions at United States Walmarts
- Debit Cards Falling Behind Credit Cards in EMV Migration
- Malware Targets Pennsylvania Holiday Inn’s Computer System
- Contactless payment limit raised from £20 to £30
- Carphone Warehouse customer data breach investigated
- PCI DSS- Detroit Zoo One of Many Affected by SSA Breach
- CVS investigating possible payment card breach
- What does the future hold for the payment card industry?
- eBay e-commerce platform under attack
- PCI Council launches group to help improve SME compliance
- Attacks on Point of Sale systems are racking up huge losses for companies
- Sally Beauty May Have Suffered a Second Security Breach
- PCI gives 14 months to fix high risk SSL problem
- PCI DSS 3.1 Forces Move From SSL to TLS
- Change Tracking for PCI DSS Compliance
- 3 new breaches reported: Hotel POS systems infected with malware, Aquarium supplies website compromised and a POS Systems provider investigates card data theft from its customers’ systems
- TalkTalk's hacked customer data: A feast for fraudsters and phishing scammers
- 3 new breaches – a hacked eCommerce site, POS malware and a spear phishing attack
- Exposing a cyber criminal gang responsible for the theft of $100M's, credit cards and intellectual property
- Established telecom company chooses New Net Technologies to ensure PCI DSS compliance
- New breaches show every organization is potentially at risk and why file integrity monitoring would have helped
- New Net Technologies Letter To The Editor Of Retail Technology
- Moonpig app pulled over security fears
- Cyber attacks on retailers becoming more targeted - Is the PCI DSS V3 enough?
- Suspected POS breach at Chick-fil-A: Did the PCI DSS fail?
- Staples Breach - Bigger than expected
- More pressure on Retailers to confront cyber security threats - LusyPOS and Bebe Store Breach
- Why are retailers still falling prey to the same problem? It's time to spot the breach!
- Point-of-Sale Malware “d4re|dev1|” is Attacking Ticket Machines and Electronic Kiosks
- Union Bank Bags PCI DSS Certification
- Update on PSD2 – the PCI SSC view
- HSBC Acknowledges Massive Payment Card Breach
- Partnership brings PCI DSS compliance to Nigeria
- Staples payment card breach suspected - Has BlackPOS struck again?
- POS Protection - If Target didn’t concern you, maybe Home Depot will?
- PCI DSS: Best Practise to ensure compliance
- Dairy Queen confirms breach, Backoff malware intrusion at 395 U.S. stores
- KMart breach - More cloned cards on their way?
- New Net Technologies Letter To The Editor Of Retail Systems
- PCI inertia maintains high cyber risk for retailers
- eBay Breach – A warning to consumers and retailers about the importance of Password Policy
- Hacker battles encryption, nabs card info from online retailer
-
NIST 800 53
- Cybersecurity Certification Program for US Defense Contractors Expected in 2020
- Louisiana Declares State of Emergency Following Cyber Attack
- California State Auditor Finds Flaws in Government IT Systems
- U.S. State Department Failing to Address Cybersecurity Basics
- NIST Small Business Cybersecurity Act Signed into Law
- IIC Releases New IoT Endpoint Best Practice Guide
- Details Behind DoD Cybersecurity Scorecard 2.0 Released
- Wi-Fi Alliance Enhances Security Measures for 2018
- Report Finds Federal Websites Still Lack Basic Security Requirements
- NIST Issues New Cybersecurity Workforce Framework
- Trump Signs Cybersecurity Executive Order
- NIST Releases Guidelines to Enhance Email Security
- NIST Updates Telework Guidelines after 7 Years
- Humans- The Perfect Exploit in a Hackers Scheme
- Hackers 'stole data of millions of US government workers'
- Survey: 75 percent of companies have significant risk exposure
- Millions of US government workers hit by data breach
-
NIST 800-171
- U.S. Government Payment Provider Exposes 14M Records
- DoD Issues New Guidance to Drive NIST 800-171 Compliance
- Danish Railway Company Suffers DDoS Attack
- Cyberattack Proves Gas Pipelines Vulnerable to Attack
- IoT Security Spending Expected to Reach $1.5 Billion in 2018
- What You Risk by Not Guaranteeing NIST 800-171 Compliance
- Updates to NIST Cybersecurity Framework to be Revealed Spring 2018
- 21K Soldiers and Civilians Impacted by US Marines Data Breach
- DOJ Unveils New Cybersecurity Task Force
- Is Your Organization Ready for NIST 800-171?
-
DISA STIG
- South Korean Hosting Firm Pays Record-Setting $1 Million Ransom Demand
- NNT Awarded Army Certification of Networthiness Accreditation
- U.S. Aviation Authorities Recommend New Cybersecurity Measures
- Hacked Swedish Military Server Used in 2013 Financial Attacks
- UK Builds £40 Million Military Cyber Defense Center
- Chinese National Pleads Guilty to Hacking U.S. Defense Systems
-
NERC CIP
- US Energy Company Fined $10 Million for Cybersecurity Failures
- Port of San Diego Suffers Ransomware Attack
- House Passes Bill to Address Industrial Cybersecurity Threats
- U.S. Offers $25 Million Cybersecurity Grant after Recent Pipeline Attacks
- FERC Proposes Updates to NERC CIP Standard
- UK Firms Fear Cybersecurity Threats in Energy Sector
- Study Find 3,000 Industrial Sites hit by Non-Targeted Malware a Year
- US Oil and Gas Firms Falling Behind in Cyber Security Preparedness
- BlackEnergy Malware Linked to Ukrainian Power Outage
- Fictional APT attack on NorthEastern Energy grid predicts costs of $1T and 93 million left without power
- British Gas bows to criticism over blocking password manager
- Destructive Cyber-Attacks Blitz Critical Infrastructure
- NERC CIP compliance: Power grid under attack every four days - or is it more frequent?
- ICS-CERT: 38% of Breaches Used An 'Unknown' Access Vector
- NERC CIP 5 Update: Critical vulnerability found in Schneider Electric SCADA Gateway
- Steel Mill shut down by hackers - Does NERC CIP have a wider remit?
- BlackEnergy malware infects industrial control systems
- FedRAMP
-
HIPAA, HITECH
- Unprotected Medical Images and Data Belonging to Millions of Americans Found Online
- Wyoming Hospital Systems Down After Ransomware Attack
- IBM's Annual Cost of a Data Breach Report Released
- More Healthcare Firms Impacted by AMCA Breach
- Premera Blue Cross Agrees to Pay $10 Million to States over Data Breach
- Data Breach May Have Exposed Nearly 12 Million Quest Diagnostics Patients
- Study Finds Healthcare Orgs Failing on Cybersecurity Hygiene
- U.S. Attorneys General File First Multi-State HIPAA Related Lawsuit
- Anthem Agrees to $16m HIPAA Settlement
- Leading U.S. Healthcare Provider Hit by Targeted Phishing Attack
- Securing Electronic Health Records: What’s at Stake?
- 70% of Healthcare Organizations Suffer from Data Breaches
- New Study Claims Larger Healthcare Orgs are More Susceptible to Breaches
- Stolen Medical Data Becoming too Common for English Adults
- 400K Patient Records Exposed in January Healthcare Breaches
- Banner Health Warns 3.7 Million of Data Breach
- Pending New York Data Breach Legislation Could Affect PHI Security
- 98% of Leaked Healthcare Data Caused by Large Scale Attacks
- Is Your Health Data in the Right Hands?
- Healthcare Industry Still Falling Behind in IT Security Efforts
- United States Consumers Fearful of Cyber-Attacks
- Audit Finds Healthcare.gov Guilty of Weak Cyber-Security Practices
- Healthcare Institutions are Three Times More Likely to be Targeted for Cyber Attacks
- Encrypted medical databases shown to leak information
- NHS blunder breaches data on 3000 patients
- Security Stories to Watch: Data Breaches, Human Error and More
- HIPAA Compliance - New Resources to Further Reduce Cyber Security Risk to Healthcare Systems
- Epidemic of medical data breaches leaking our most sensitive information
-
Sarbanes-Oxley (SOX)
- New York State Reveals New Cybersecurity Regulations for Financial Industry
- Lloyds Bank Knocked Offline in DDoS Attack
- Heads up Finance Industry- Key Threats to Look Out For in 2016
- IBM Finds Human Error the Leading Cause of Data Breaches
- New York Financial Sector Considering New Cyber Security Rules
-
FDCC-USGCB
- 2 Million Michigan State Employees PII Exposed
- US Department of Defense Announces Launch of ‘Hack the Pentagon’ Bug Bounty Program
- U.S. Government Introduces New ‘National Background Investigation Bureau’
- Tim Cook Lashes Out During Meeting With US Government Over Encryption
- White House Officials Meet with Tech Giants to Discuss Fighting Terror
- COBIT, ITIL and ISO27001
- CESG
- State of California Data Security Breach Reporting
-
General Data Protection Regulation (GDPR)
- Italian Bank UniCredit Suffers Data Breach
- Report Finds Over Half of UK Orgs Still Not GDPR Compliance
- ICO Issues Huge Fines to British Airways, Marriott
- Facebook Urged to Provide Breach Details to UK Regulators Swiftly
- Data Breach Reports Have Quadrupled Under GDPR
- Update: Timehop Reveals More Personal Data was Compromised in Data Breach
- Facebook Fined £500,000 Over Cambridge Analytica Scandal
- Timehop Data Breach Hits 21 Million Users
- Latest NCSC Report Highlights Top Cyber Threats to UK Businesses
- Trend Micro Predicts Known Vulnerabilities will Plague 2018
- Third Party Cyber Incidents Costing Businesses Millions
- Pizza Hut Customers Enraged by Delayed Breach Notification
- 1.9 Million Records Compromised First Half of 2017
- UK Retail Breaches Double in the Last Year
- UK Government Will Invest £21 Million in NHS Cybersecurity
- Cloud Services Falling Behind in GDPR Migration
- New Breach Guidelines Issued by European Banking Authority
- EU’s New ‘General Data Protection Regulation’
- Number of Stolen Credentials Skyrockets 141% in North America
- 2.2 Million Dow Jones Customers Impacted by Exposed Data
- China’s New Cybersecurity Law Takes Effect on Thursday
- Experts Focus on Potential Security Threats for 2017
- New York Governor Proposes Harsher Cyber Security Punishments
- Sensitive UK Government Data for Sale on Darknet
- Cyber-crime empties pockets of UK businesses
- US University to spend $3 million on cyber security
- Hackers trade on inside information to net $100m
- Council data security 'shockingly lax'
- Serious flaw allowed security bypass on Italian visa site
- Security compliance is still a corporate headache
- Cost of a data breach: 58 cents per record, says Verizon
- The Security Industry’s Biggest Challenges
- Don't delegate cyber risk management responsibility
- FTSE 350 firms still have long way to go on cyber risk
- Starting up: the business co-founders in different countries
- The Snappening - News of a Snapchat 'breach'
-
PCI DSS Compliance
-
Change Tracker Enterprise
- 200,000 Customers Affected by UK-Based Truly Travels Breach
- Researchers Discover a Dozen US Web Servers Hosting 10 Malware Families
- OPM Still Failing on Cyber Security Almost 4 Years After Breach
- Report Finds Malicious Login Attempts on the Rise
- NotPetya Attack Disrupts Merck’s Q2 Global Operations
- CEOCFO Magazine Interviews NNT CEO- Mark Kerrison
- Delta Computer Outage Causes Massive Delays in Service
- FBI Warns Hacked LinkedIn & Myspace Users of Bitcoin Extortion Scam
- Cyber Attacks Against UK Businesses Increase Over Past Year
- World Backup Day Returns to Remind Us to Protect Our Data
- IoT Security Lacking in Southeast Asian Organizations
- UK’s National Cyber Security Centre Set to Open in October 2016
- HPE Releases 2016 Cyber Risk Report
- TalkTalk’s Breach to Cost an Estimated £80 Million in Losses
- Dutch Government Votes No on Encryption Backdoors
- New Zealand Introduces New Cyber Security Strategy
- EU's New Cyber Security Law Encourages Firms to be Open about Security
- United Airlines Bug Bounty Program Backfires After Extreme Delays in Patching
- Operation 'Resilient Shield' to Test the UK Financial Sector
- China and Germany Work Together to Ward off Cybercrime
- Part III- The Next Generation of Breach Prevention
- Part II- The Next Generation of Breach Prevention
- Part I- The Next Generation of Breach Prevention
- The Top 6 Security Threats Financial Firms will Face in 2016
- UK firms hit as Dridex criminals target 385 million emails
- NEW NET TECHNOLOGIES DEBUTS CHANGE TRACKER™ GENERATION 7
- URI Current & Former Students Email Credentials Compromised
- Analogue criminals are going digital, says police study
- 2014 saw step change in anti cyber attack collaboration
- NNT Change Tracker receives another 5 Star Review from Secure Computing
- FAST Cloud
-
Change & Configuration Management
- First Day Back to School Delayed Due to Cybersecurity Threat
- Financial Sector Facing Record Number of Cyber Attacks
- Embracing Configuration Management & Closed-Loop Intelligent Change Control
- Cyber Security's 'Dirty Little Secret'
- Airbus Employee Data Compromised in Cyber-Attack
- Uber to Pay $148M Settlement after 2016 Data Breach Scandal
- Hackers Steal Nearly $14 Million from Indian Cosmos Bank in ATM Attack
- UK Releases Minimum Cyber Security Standard for Government Departments
- 3 Simple Steps For Securing Your Network
- Data Security Incidents on the Rise as Human Error Dominates
- Insider Breach Costs Soar to $8.7+ Million
- Verizon Releases Latest Breach Investigation Report
- Majority of Critical Infrastructure Operators Vulnerable to Attack
- 2017 Named Worst Year Yet for Cyber Threats Targeting UK Firms
- Less Malware Reported, but Increase in Sophistication
- Samba Issues Patch for 7-Year-Old Wormable Bug
- Scottrade Bank Exposes Credentials of 20,000 Customers
- Cyber Attack Forces UK’s Largest NHS Trust Offline
- Are Small & Medium Sized Businesses Taking Security Seriously?
- U.S. Internal Revenue Service Hacked- Again
- Social Security & Banking Information Compromised in TaxAct Breach
- IT Professionals Feel Responsible for Securing Company Data
- Top 5 Online Fraud Predictions- What to Expect in 2016
- Sophisticated Cherry Picker POS Malware Goes Undetected for Four Year
- UK’s Latest CyberInvest Plan to Help Strengthen CyberSphere
- Uber Software Flaw Exposes Hundreds of Drivers Personal Information
- Study Finds Quarter of Companies Can't Figure Out How Hackers Got In
- Cyber Security | A Shared Responsibility
- Experian Exposes 15 Million T-Mobile Customers Credentials
- Point-of-Sale Breach Linked to Hilton Hotel Properties
- Cyber insurance not trusted by business, KPMG claims
- Cities 'wide open' to cyber-attacks
- GHOST vulnerability - How to check for it, and how to remediate it
- 2014 - Year of the Breach - Lessons learned from recent breaches
- The biggest threat to IT Security could be you
- Preventing Employee Own Goals
- IT Partnerships
- Tripwire® Alternative
-
Ransomware
- Major US Hosting Provider Hit by Ransomware
- Ransomware Attack Takes Down German Automation Giant
- Global Shipping Giant Pitney Bowes Hit by Ransomware Attack
- Hearing Aid Giant Demant Warns of Extreme Losses Due to Ransomware Attack
- Senate Passes New Ransomware Law
- New Zealand Businesses and Citizens Report Record Losses Due to Cybercrime
- NATO - Cyber Attack on One Will Trigger Full NATO Response
- Trend Micro Releases 2019 Mid Year Security Roundup
- 23 Local Government Entities in Texas Hit With Ransomware Attacks
- City of Naples Suffers Losses from Spear-Phishing Attack
- LA Governor Declares State of Emergency After School Districts Suffer Cyber Attacks
- Second Florida City Struck by Ransomware to Pay Off Hackers
- Florida City Pays $600K to Re-Gain Access to Systems After Ransomware Attack
- 2 Years after WannaCry Outbreak, Millions Still Remain at Risk
- Matrix-Themed Ransomware MegaCortex Spreads
- Mondelez Sues Zurich over NotPetya Payout Dispute
- Shipping Giant COSCO Hit by Ransomware Attack
- New Ransomware Variant Includes Cryptocurrency Mining Capabilities
- Cybercrime Losses in 2017 Exceed $1.4B
- City of Atlanta Spending Tops $2.7 Million in Ransomware Remediation
- Boeing Computer Systems Hit by WannaCry Ransomware
- City of Atlanta Hit by Ransomware Attack
- McAfee Finds Increase in Fileless Malware, Cyber Attacks Targeting Health Providers
- Five Eyes Nations Blame Russia for NotPetya Attack
- 19 Million Californians Voter Records Held for Ransom
- US Blames North Korea for WannaCry Cyber Attack
- Are we too Busy with Pancakes to get Serious about Ransomware?
- Ransomware Targeting Business Users Increases to 26%
- Two-Thirds of Orgs Running Out of Date Office Software
- UK Government Points Blame to North Korea for WannaCry Incident
- Oh KRACK! What We Know About Today’s Massive Wi-Fi Security Flaw
- New Crypto-Ransomware Attacks 20 Million Inboxes
- NHS Scotland Org Suffers Second Ransomware Attack
- Ransomware: The Great White Shark of Malware- WannaCry Update
- Study Finds Public Cloud More Secure than Private or Hybrid Cloud
- If WannaCry Didn’t Scare You, Maybe Petya Will
- Windows XP Spotted on the HMS Queen Elizabeth
- Honda Forced to Shut Down Plant After WannaCry Infects Network
- WannaCry Ransomware Didn’t Start with Phishing Attacks
- WannaCry Strikes Back with New Variants
- NHS Hit by Massive Cyber Attack
- Election Themed Spam on the Rise Following US Presidential Race
- Ransomware: The Great White Shark of Malware and What You Need to do About it
- White Hats Work Together to Fight Todays Ransomware Threat
- FBI Issues New Ransomware Alert Amid Utility Hack
- Locky Ransomware Becomes More Evasive Than Ever Before
- Cloud Apps Vulnerable to Unsecured Ransomware Attacks
- New Locky Ransomware Spreading Like Wildfire
- Hollywood Hospital Held for Ransom by Hackers
- Ransomware Cripples County Council for Nearly a Week
- 'British Gas' and 'Home Office' email ransomware warning
- One third of UK companies beset by ransomware
- Security Through System Integrity
-
Vulnerability Scanning
- Health Data Belonging to 1 Million New Zealanders at High Risk of Compromise
- Remote Access Vulnerabilities Found in Popular IoT Devices and Routers
- Google Reports Massive iPhone Security Flaw
- 34% of Vulnerabilities Reported in First Half of 2019 Remain Unpatched
- Researcher Warns of Airlines Failing to Protect Customer Data
- US Coast Guard Reveals Large Vessel Suffered a Cyber Attack
- Vulnerability Scans Are a Lot Like Eating Mushrooms
- When Old News is More Dangerous Than Fake News: Vulnerability Scan Blindspots
- When is a vulnerability not a vulnerability?
- XP Support Has Ended - Breach Prevention and Host Intrusion Detection Have Never Been More Valuable
-
File Integrity Monitoring
-
Articles
-
File Integrity Monitoring
- Faster Detection Saves Orgs 70% in Data Breach Costs
- Threat Intelligence- Tell Me Everything, but Only What I Need to Know
- Implementing Layered Security to Protect Against Modern Malware
- File Integrity Monitoring: Your Last Line of Defense in Achieving PCI DSS Compliance
- Windows File Integrity Monitoring 101
- The Finance Industry- The Perfect Ploy in a Cyber Criminals Scheme
- Is all fraud preventable? File integrity monitoring and what should businesses be doing?
- File Integrity Monitoring – 3 Reasons Why Your Security Is Compromised Without It Part 2
- File Integrity Monitoring – 3 Reasons Why Your Security Is Compromised Without It Part 1
- Which File Integrity Monitoring Technology Is Best For FIM? File Integrity Monitoring FIM or SIEM FIM?
- A New Role for FIM in the Unix and Linux World – Undoubtedly, This is The Shape of Things to Come…
- File Integrity Monitoring Software
- File Integrity Monitoring – Use FIM to Cover All the Bases
- File Integrity Monitoring - FIM Could Just Save Your Business
- Agentless FIM – Why File Integrity Monitoring Without Agents Is The Same, and Better, and Worse than using Agents
- File Integrity Monitoring and SIEM - Why Layered Security Is Essential to Combat the APT
- Tripwire® Alternative
-
Device Hardening
- Disable Windows Services
- Cyber Threat Sharing Bill and Cyber Incident Response Scheme – Shouldn’t We Start with System Hardening and FIM?
- File Integrity Monitoring – Database Security Hardening Basics
- Linux Server Hardening
- Windows Server 2008 2008R2 Hardening Guide
- Server Hardening Policy - Examples and Tips
- Server Hardening Checklist - Which Configuration Hardening Checklist Will Make My Server Most Secure?
- What are the recommended Audit Policy settings for Linux
-
CIS Benchmark
- Modernising Your Cyber-Security Approach - A Panel Discussion
- CIS Rebrands to Reflect Evolving Online Threat Landscape
- Target Reaches $39.4 Million Settlement with Banks over 2013 Data Breach
- The Windows Advanced Audit Policy Configuration
- What are the recommended Audit Policy settings for Windows when implementing logging for the PCI DSS or other security standard?
-
CIS Controls
- CIS Control 1: Inventory and Control of Hardware Assets
- CIS Control 2: Inventory and Control of Software Assets
- CIS Control 3: Continuous Vulnerability Management
- CIS Control 4: Controlled Use of Administrative Privileges
- CIS Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers
- CIS Control 6: Maintenance, Monitoring and Analysis of Audit Logs
- CIS Control 7: Email and Web Browser Protections
- CIS Control 8: Malware Defenses
- CIS Control 9: Limitation and Control of Network Ports, Protocols, and Services
- CIS Control 10: Data Recovery Capabilities
- CIS Control 11: Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches
- CIS Control 12: Boundary Defense
- CIS Control 13: Data Protection
- CIS Control 14: Controlled Access Based on the Need to Know
- CIS Control 15: Wireless Access Control
- CIS Control 16: Account Monitoring and Control
- CIS Control 17: Implement a Security Awareness and Training Program
- CIS Control 18: Application Software Security
- CIS Control 19: Incident Response and Management
- CIS Control 20: Penetration Tests and Red Team Exercises
- Before Chewing Through Compliance, Nibble the CIS Controls
- Event Log Management
-
Change & Configuration Management
- October is National Cyber Security Awareness Month- So Just How Secure is Your Organization?
- Department of Homeland Security’s Cyber Security Still Vulnerable
- File Integrity Monitoring – 3 Reasons Why Your Security is Compromised Without it Part 3
- File Integrity Monitoring - Is FIM Better Than AV? Is a Gun Better Than a Knife?
-
Breach Detection
- A Look Back at the Biggest Data Breaches of 2016
- Historic Yahoo Data Breach: 1 Billion Accounts Compromised
- Why Corporate Security Fails- A Focus on Leadership
- Global Cyber Security Spending to Reach $82 Billion This Year
- Average Cost of Data Breach Spikes to $4 Million in 2016
- Cybercrime: The Leading Cause of Data Breaches in Healthcare
- 2015 Data Breach Review
-
Compliance
- DISA-STIG
-
PCI DSS Compliance
- PCI DSS 2018: What Does the Future Hold?
- PCI DSS- The Present & Future
- PCI – Going Beyond the Standard: File Integrity Monitoring
- Customer is King, but what do they want when it comes to online Security?
- PCI DSS POS breach: Do you allow 3rd party access to your systems or provide IT services to customers with Governance, Risk Management and Compliance responsibilities?
- Is Your QSA Making You Less Secure?
- PCI DSS Version 3 and File Integrity Monitoring – New Standard, Same Problems
- File Integrity Monitoring - View Security Incidents in Black and White or in Glorious Technicolor?
- FIM for PCI DSS - Card Skimmers Still Doing the Business After All These Years
- Tokenization, the PCI DSS and the Number One Threat to Your Organization's Data
- SOX
- HIPAA HITECH
- FedRAMP
- NERC CIP
- NIST 800-53
- NIST 800-171
- COBIT-ITIL-ISO27001
- General Data Protect Regulation GDPR
- Ransomware
- Vulnerability Scanning
-
File Integrity Monitoring
- Press Releases
-
White Papers
-
PCI DSS Compliance
- PCI DSS Compliance: 6 Steps to get compliant - and stay compliant
- PCI DSS V3.2.1 Compliance Solution Brief - Learn Now NNT Solutions Address PCI DSS Requirements
- The Target Breach - NNT’s Perspective
- PCI DSS 101 - the background you need to understand the PCI DSS
- PCI Compliance in 10 minutes a day UPDATED FOR PCI DSS 3
- File Integrity Monitoring
- Compliance
- Tripwire® Alternative
- Device Hardening
- Event Log Management
- Change & Configuration Management
- Breach Detection
- HIPAA HITECH
- Ransomware
- FAST Cloud
- Vulnerability Scanning
-
PCI DSS Compliance
-
Case Studies
- File Integrity Monitoring
-
Tripwire® Alternative
- Tripwire® Alternative: Telecom Company Switches From Tripwire® to NNT
- LiveTV Migrated From Tripwire® Enterprise to NNT Change Tracker
- Universal Studios Orlando Successfully Migrated From Tripwire® Enterprise and Tripwire® Log Center to NNT Change Tracker and NNT Log Tracker
- Europe’s Favourite Low Fares Airline Trialled Both Tripwire® and NNT Solutions for FIM and SIEM
-
Event Log Management
- PIC Inc. Achieves PCI Compliance with NNT Change Tracker and Log Tracker
- SIEM and Event Log Management Case Study: Leading Finance Provider Wonga Meets PCI Compliance Needs for SIEM and FIM Using NNT
- Managed Security Services Case Study: WH Smith Manages PCI DSS Compliance by the Book With NNT Log Tracker SIEM Solution
-
Compliance
- NERC CIP
-
PCI DSS Compliance
- Leading Payment Gateway Chooses NNT for PCI Compliance
- Payment Service Provider Passes PCI Audit With Change Tracker Gen7 R2
- PCI Compliance via a 'Homeostatic Equilibrium' - Miles Technologies
- NNT Gets ABRSM in Tune with PCI DSS
- NAFSA is Well Educated and Learned in PCI DSS Compliance
- Harrods Selects NNT Change Tracker for PCI DSS Compliance
- Biaggi's Ristorante Italiano Order NNT Change Tracker to Satisfy PCI Hunger
- Device Hardening
- CIS Benchmark
- Change and Configuration Management
- SecureOps™
-
Webinars
- Change Tracker™ Enterprise Gen7 R2
- NNT Vulnerability Tracker™
- Compliance
-
CIS Controls
- Any Port In a Storm of Cyber-Security Remains a Problem: CIS Control 9
- Cybersecurity Lesson from the Death Star: CIS Control #5 Explained in 30 Minutes
- Webinar: Modernizing Cyber Security with CIS
- Webinar: 2016 Cyber Security Threat Predictions Webinar & Whitepaper Synopsis
- Webinar - Stop the Breach or Spot the Breach? A joint CIS & NNT Event
- PCI DSS Compliance
- Ransomware
-
Video
-
Change Tracker™ Enterprise Gen7 R2
- Mega-Scale Change Control
- IBM QRadar® Integration – IBM Validated
- What's New - Gen7 R2?
- NNT Change Tracker™ Detects Unplanned Changes and Creates New Security Incidents in ServiceNow®
- NNT Change Tracker Gen 7 Short Features Video
- Easily Compare & Contrast Compliance Reports with Gen7
- Watch the pre-recorded Change Tracker 7 demo
- NNT Change Tracker Enterprise: Managing the Enterprise Attack Surface
- FAST Cloud™ Threat Intelligence
- Vulnerability Tracker™
- File Integrity Monitoring
- PCI DSS Compliance
- CIS Benchmark
- SecureOps™
- Device Hardening
- ITSM Integration
-
Change Tracker™ Enterprise Gen7 R2
- Videos & Webinars
- Newsletters
-
Top Tips & Tricks
- Change Tracker "Change Manifest" Planned Change Feature
- Integrating Change Tracker™ Gen7 R2 with QRadar®
- Change Tracker’s ITSM Integration
- The Change Tracker API
- Group Notifications with Change Tracker Gen7
- Advanced Text Search Capabilities with Change Tracker
- All New Compliance Report Task List
- Automatically Approve File Changes Using the World’s Largest File Reputation Whitelisting & Reputation Database
- EternalBlue Exploit Used in WannaCry Attack
- Derive, Report and Track Drift from an Approved System Image Baseline using Change Tracker Gen7
- Firewalls & SIEM- Fear and Loathing of Log Savers
- Laser-Precision Planned Change Rules
- Comparing Compliance Reports with Gen7
- Reduce the Attack Surface - Tracking Open Network Ports
- Exclusions - Logon Scripts and the Template Regex
- Functional Specific Group – Inherited Monitoring and Reporting Templates
- HASH Values
- Ransomware: How to Protect Your Organization from Being the Next Victim
- Hardening Your System Processes
- Re-Evaluating Events with Change Tracker
- File Content Tracking with Gen7
- Running an Adhoc Compliance Report
- CIS Controls
- CIS Benchmark Reports
- SANS Institute Posters
- Audit Policy Templates
- Hardened Services Guide
- FAQ
- Secure Controls Framework
- Sans Leadership Security Poster
- Windows Server Hardening
- CIS Materials
- White Papers
- NNT Solution Briefs
-
Blog
- Members
- Company
- Request a Demo
- Get a Quote
- Request a Trial
- Testimonials
- Contact NNT