Specialty networking solutions provider, Belden, owners of specialist cyber security vendor Tripwire, recently disclosed a data breach resulting in the theft of employee and business information.
Belden Discloses Data Breach Impacting Employee, Business Information
Before you chew through Compliance, consider trying the CIS Controls
Have you heard of the CIS Controls? Even though they’re not part of any specified GRC (Governance, Risk Management, Compliance) mandate, they could actually be used as the foundation for them all.
When Old News is More Dangerous than Fake News: Vulnerability Scan Blind Spots
Out of all the cat videos you could watch, how do you decide which one to view first? The beauty of social media is its real-time, democratic operation. Everyone gets to vote and the content with the most shares is the People’s Choice, rightfully ‘The Best’. But we now know this Facebook-era notion of ‘most popular equals best’ is open to abuse.
5 Key Processes & Controls to Maximize Cybersecurity Effectiveness
As of late, cybersecurity has come to the forefront of the I.T. Industry, and is one of the key functions of any organization. This article will discuss 5 key processes and potential controls you should implement in order to maximize the effectiveness of your cybersecurity efforts, leading to an all-around secure environment.
Change Management's 'Dirty Little Secret'
How to Secure Risky Open Network Ports, Protocols and Services
Securing Digital Transformation in the New Normal
Critical Vulnerabilities in ICS Products Could Enable OT Execution Attacks
Security researchers recently discovered six critical vulnerabilities in third-party code that could expose hundreds of thousands of OT environments to remote code execution attacks.
How to Defend Against and Spot Malicious Insider Threats
Safeguarding against insider dangers in cybersecurity is among the leading issues that organizations are encountering today. Whether that risk results from ignorance, oversight or is made with harmful intent, utilizing these techniques will significantly help secure your organization.
Understanding the Essential Elements of a SecureOps Strategy
The traditional approach to security is desperately flawed. NNT’s SecureOps strategy is a progressive way to deal with solving the problem of cybersecurity by combining the essential prescribed security controls recommended by frameworks such as NIST and the Center for Internet Security (CIS) with advanced threat prevention and detection, closed-loop intelligent change control and continuous compliance monitoring technology.