<span id="hs_cos_wrapper_name" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="text" >NNT Blog</span>
Security Unlocked by NNT

When Old News is More Dangerous than Fake News: Vulnerability Scan Blind Spots

Oct 21, 2020 12:02:21 PM / by Mark Kedgley

Out of all the cat videos you could watch, how do you decide which one to view first? The beauty of social media is its real-time, democratic operation. Everyone gets to vote and the content with the most shares is the People’s Choice, rightfully ‘The Best’. But we now know this Facebook-era notion of ‘most popular equals best’ is open to abuse.

Read More

5 Key Processes & Controls to Maximize Cybersecurity Effectiveness

Oct 13, 2020 10:32:45 AM / by Spartak Goskolli

As of late, cybersecurity has come to the forefront of the I.T. Industry, and is one of the key functions of any organization. This article will discuss 5 key processes and potential controls you should implement in order to maximize the effectiveness of your cybersecurity efforts, leading to an all-around secure environment.

Read More

Change Management's 'Dirty Little Secret'

Oct 8, 2020 1:50:15 PM / by Mark Kedgley

Change Management is blind. It is a key IT Service Management process and, undeniably, it's beneficial to plan and schedule changes. But Change Management’s ‘dirty little secret’ is that, despite the comfort blanket of documentation and approvals, you never know what’s really going on.

Read More

How to Secure Risky Open Network Ports, Protocols and Services

Sep 30, 2020 10:38:02 AM / by Mark Kedgley

If you think you’re having a bad day, you should see what happened to a group of Greek merchants crossing the Black Sea, 2,400 years ago. Providing a stark perspective on the vastness of history, their ship has just been discovered under 2km of water. 

Read More

Securing Digital Transformation in the New Normal

Sep 21, 2020 3:01:47 PM / by Mark Kedgley

Last week, our team had the pleasure of hosting a virtual panel on securing digital transformation and what COVID-19 means for cyber security as we continue to navigate the increasingly remote workforce.

Read More

Critical Vulnerabilities in ICS Products Could Enable OT Execution Attacks

Sep 14, 2020 11:18:36 AM / by Morgan Reed

Security researchers recently discovered six critical vulnerabilities in third-party code that could expose hundreds of thousands of OT environments to remote code execution attacks.

Read More

How to Defend Against and Spot Malicious Insider Threats

Sep 10, 2020 10:52:23 AM / by Gene Atwood

Safeguarding against insider dangers in cybersecurity is among the leading issues that organizations are encountering today. Whether that risk results from ignorance, oversight or is made with harmful intent, utilizing these techniques will significantly help secure your organization.

Read More

Understanding the Essential Elements of a SecureOps Strategy

Sep 3, 2020 2:50:42 PM / by Mark Kerrison

The traditional approach to security is desperately flawed. NNT’s SecureOps strategy is a progressive way to deal with solving the problem of cybersecurity by combining the essential prescribed security controls recommended by frameworks such as NIST and the Center for Internet Security (CIS) with advanced threat prevention and detection, closed-loop intelligent change control and continuous compliance monitoring technology.

Read More

Accomplish More with Less with the Basic CIS Controls

Aug 19, 2020 10:58:13 AM / by Ben Richmond

Data breaches are a common occurrence in the world we live in today. Whether its personal data that relates to an organizations’ customers or data referencing the inner workings of an organization’s infrastructure, when it falls into the wrong hands, the consequences are disastrous.

Read More

What Will You Choose – Big Brand or the Most Intelligent FIM & Change Control Solution on the Market?

Aug 13, 2020 8:45:43 AM / by Mark Kerrison

There are two things that you might consider when selecting a File Integrity Monitoring (FIM) and Change Control solution – 1) Depth of useable features such as efficiency in suppressing change noise and 2) Brand recognition.

Read More

Subscribe to Security Unlocked by NNT

Contact Us

USA Offices

New Net Technologies LLC
Suite #10115, 9128 Strada Place
Naples, Florida, 34108

New Net Technologies LLC
1175 Peachtree St NE
Atlanta, Georgia, 30361.

Tel: (844) 898-8358
USinfo@nntws.com

 

UK Office

New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
 UKinfo@nntws.com

SC Magazine Cybersecurity 500 Infosec Security Winners 2018 CIS benchmarking SEWP Sans Institute Now Certified IBM Security
Copyright 2020, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.