<span id="hs_cos_wrapper_name" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="text" >NNT Blog</span>
Security Unlocked by NNT

Critical Vulnerabilities in ICS Products Could Enable OT Execution Attacks

Sep 14, 2020 11:18:36 AM / by Morgan Reed

Security researchers recently discovered six critical vulnerabilities in third-party code that could expose hundreds of thousands of OT environments to remote code execution attacks.

Read More

How to Defend Against and Spot Malicious Insider Threats

Sep 10, 2020 10:52:23 AM / by Gene Atwood

Safeguarding against insider dangers in cybersecurity is among the leading issues that organizations are encountering today. Whether that risk results from ignorance, oversight or is made with harmful intent, utilizing these techniques will significantly help secure your organization.

Read More

5 Steps to Effective Patch Management

Jul 14, 2020 12:18:19 PM / by Hasan Kismetli

Patch management is the process of analyzing the systems within your network for missing updates. This process shines a spotlight on the vulnerable systems within your network, allowing you to apply the necessary patches to those systems. This ensures that any vulnerabilities or bugs present in the software gets fixed.

Read More

Cybersecurity Threats Facing the Technology Industry

Jun 3, 2020 9:16:31 AM / by Phill Harris

As companies face increasingly sophisticated cyber threats, they often turn to technology solutions to help protect their data and systems from attacks. But what happens when your company is in the technology industry?

Read More

Monthly Data Breach Round-Up: May Edition

May 29, 2020 10:31:02 AM / by Morgan Reed

Cybercriminals continue to take advantage of the global pandemic created by COVID-19 and are targeting government agencies and organizations via phishing emails and malware attacks.

Read More

How to Move from a DevOps to a DevSecOps Approach

May 19, 2020 11:12:54 AM / by Phill Harris

DevOps and traditional security have historically operated with different schools of thought. In the past, security was seen as a hindrance to the DevOps process and the role of security was left to address at the end of an applications life cycle.

Read More

GoDaddy Data Breach Goes Undetected for 7 Months

May 6, 2020 10:48:35 AM / by Morgan Reed

The popular domain registry and web hosting company GoDaddy is in the headlines this week after the company reported that an unauthorized user accessed login information used by an undisclosed number of its 19 million customers.

Read More

Top 5 Vulnerability Management Best Practices

Apr 17, 2020 11:04:58 AM / by Denis Goskolli

Reducing your attack surface requires a robust vulnerability management solution to help combat today’s most persistent and devastating cyber threats.

Read More

Organization's Face Increased Attack Surface, Vulnerabilities in Response to COVID-19

Mar 27, 2020 11:25:22 AM / by Mark Kerrison

Organizations across the world are on the front lines of the ongoing COVID-19 crisis, being forced to thwart off cyber criminals as the coronavirus pandemic continues to spread. 

Read More

Virgin Media Data Breach Exposes 900,000 Customers

Mar 9, 2020 12:32:44 PM / by Phill Harris

Virgin Media, a telephone, TV and internet service provider in the UK, has publicly apologized after a database containing the personal details of 900,000 customers was left unsecured and accessed without permission due to improper configuration for over 10 months.

Read More

Subscribe to Security Unlocked by NNT

Contact Us

USA Offices

New Net Technologies LLC
Suite #10115, 9128 Strada Place
Naples, Florida, 34108

New Net Technologies LLC
1175 Peachtree St NE
Atlanta, Georgia, 30361.

Tel: (844) 898-8358
USinfo@nntws.com

 

UK Office

New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
 UKinfo@nntws.com

SC Magazine Cybersecurity 500 Infosec Security Winners 2018 CIS benchmarking SEWP Sans Institute Now Certified IBM Security
Copyright 2020, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.