Data breaches are a common occurrence in the world we live in today. Whether its personal data that relates to an organizations’ customers or data referencing the inner workings of an organization’s infrastructure, when it falls into the wrong hands, the consequences are disastrous.
Accomplish More with Less with the Basic CIS Controls
What Will You Choose – Big Brand or the Most Intelligent FIM & Change Control Solution on the Market?
There are two things that you might consider when selecting a File Integrity Monitoring (FIM) and Change Control solution – 1) Depth of useable features such as efficiency in suppressing change noise and 2) Brand recognition.
Why Isn’t There A Remediation Button within Change Tracker Gen7 R2?
NNT Change Tracker is a world class solution for evaluating the security posture of your infrastructure. Whether you adhere to frameworks such as the Center for Internet Security, NIST or even if you have a home baked version of how best to harden your environment, Change Tracker will assess and report on how your deployed assets measure up against the standard.
Financial Institutions Facing Increased Threats Post COVID-19 Lockdown
The finance industry has long been the ideal target for dangerous cyber criminals, holding a treasure trove of sensitive information and financial credentials of innocent victims, but in the wake of the post COVID-19 lockdown period, researchers have found that these institutions are seeing a marked spike in cyberattacks.
Change and Configuration Management Best Practices Guide
Systems are constantly changing. Change and configuration management best practices allow organizations to keep track of configuration changes in a way that allows for rapid feature updates without any service outages, but many organizations struggle to find the ideal formula to make this process successful.
Details of 142 Million MGM Hotel Guests Found on the Dark Web
The 2019 data breach at luxury hotel chain MGM Resorts appears to be much larger than originally reported after researchers recently found 142 million hotel guests’ personal details for sale on the dark web.
5 Steps to Effective Patch Management
Patch management is the process of analyzing the systems within your network for missing updates. This process shines a spotlight on the vulnerable systems within your network, allowing you to apply the necessary patches to those systems. This ensures that any vulnerabilities or bugs present in the software gets fixed.
How to Establish a Secure Baseline
Hardening operating systems and keeping an audit trail of activity using a change detection and SIEM solution are must haves in order to ensure that your environment is safe from cyber attacks or unwanted intrusions.
Log Management Best Practices
Within the last decade or so, the advancement of distributed systems has introduced new complexities in managing your log data. Today’s systems can include Servers, Workstations, Firewalls, Databases etc., all with different Operating Systems and each generating their own log data.
PCI DSS 4.0: The Last Ever PCI DSS?
This is it, the best ever PCI DSS and what is hoped will be the definitive version. Despite being a major version change, the 12 core requirements we know and love remain. But there are some significant changes planned.