As attacks just keep coming, breaches seem to be almost inevitable. Now it's time to shift our focus to how we detect intrusions once the attacked have gained access.

As Mark Kedgley, CTO of New Net Technologies, explains in this interview, there is no such as 100% security- if you want to connect with the rest of the world, you open yourself to cyber attacks. You need to spot malicious activity on your network when it happens- as soon as it happens. 

File Integrity Monitoring (FIM), which registers changes done to files, is one way of going about it. But it can lead to a lot of false positives when regular and frequent legitimate changes- such as patching- take place. This can easily lead to alert fatigue. So we need to be smart about what kinds of alerts are generated, and learn what 'good' changes look like. If you operate properly locked-down configurations in your IT environment, this is possible, and it makes spotting & responding to malicious activity that much easier. 

 

 

The Most Powerful & Reliable Cybersecurity Products
Contact Us

USA Offices

New Net Technologies LLC
4850 Tamiami Trail, Suite 301
Naples, Florida, 34103

New Net Technologies LLC
1175 Peachtree St NE
Atlanta, Georgia, 30361.

Tel: (844) 898-8358
[email protected]

 

UK Office

New Net Technologies Ltd
The Russell Building, West Common
Harpenden, Hertfordshire
AL5 2JQ

Tel: 020 3917 4995
 [email protected]

SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Sans Institute Now Certified IBM Security
Copyright 2021, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.