Nettitude Blog

Why you need to train your team in 2018

Posted by Amy Tuck on Jan 10, 2018 10:17:16 AM

Many organizations have started to change the way they think and act about the topic of cyber security. They are now realizing that it's not about if they'll suffer a cyber breach, but when it will happen. This change in attitude towards cyber crime and the affect it can have means companies are being much more proactive, and making steps towards securing their financial and personal data. Here at Nettitude we look at the whole picture, and we educate organizations to not only look at implementing the latest technology but also the people and processes within the business. Here's a look at how the people and processes can help keep your business safe in 2018.

Read More

A quick guide to the Nettitude Security Operations Center

Posted by Ben Densham on Jan 5, 2018 11:59:24 AM

Take a guess at how many days it takes the average company to detect a cyber breach? Would you believe that it sits around the 214 day mark? That’s over 7 months where your data, your assets are at the hands of cyber criminals. Not to mention, once that attack has been spotted it can take a considerable amount of further days for that breach to be contained. By that point your business could have suffered irreparable damage, both from financial and personal data loss. 

Read More

5 cyber security events that changed the industry in 2017

Posted by Rowland Johnson on Dec 22, 2017 9:51:09 AM

It's safe to say that 2017 has been an eventful year in the cyber security industry.  As well as a steadily growing number of breaches across a multitude of organizations and industries, there have been some pivotal moments that have had a significant impact on the cyber security industry as a whole. We've looked back over the last 12 months and have chosen the top 5 events that have shaped the industry.

Read More

An insight into antivirus testing: are you protected by your endpoint security?

Posted by Jules Pagna Disso on Dec 11, 2017 4:09:34 PM

In a recent study conducted in collaboration with the University of Bradford, we put to the test static and dynamic detection of antivirus systems against malicious files and our results were significantly different from those achieved by We tested antivirus with malicious files on the day they were created. The tests performed by used malware that had been in circulation for few days.

Read More

An insight into Deception Technologies

Posted by Jules Pagna Disso and Graham Sharples on Dec 6, 2017 4:53:24 PM

Proactive defense in cyber security is difficult to achieve. Nettitude’s research team investigated the use of deception technologies to gain further insight and intelligence of how they could be used to proactively protect an enterprise level environment. Its findings show that deception technologies are still immature. More effort needs to be invested into designing and engineering systems that can gather information in this area of research, and later transformed into actionable intelligence. 

Read More

Nearly 4 Million Bitcoins Lost Forever, New Study Says

Posted by Richard Dennis on Nov 29, 2017 11:38:49 AM

Nettitude Technical Researcher, Richard Dennis, has taken a look into how nearly four million Bitcoins have been lost forever.

Read More

How $300 million worth of Ether was permanently locked up

Posted by Richard Dennis on Nov 15, 2017 4:37:58 PM

Nettitude Tehnical Researcher, Richard Dennis, explains how $300 million worth of Ether was permanently locked up.

Read More

How do you know if your SIEM/SOC is effective?

Posted by Rowland Johnson on Nov 15, 2017 11:00:00 AM

Many organizations have gone out and bought SIEM appliances which are either in-house or outsourced to an external security operations center. We have highlighted the top five areas for organizations to review, when they deploy SIEM technology, or utilize a security operations center function. This guide is designed to help improve SIEM coverage, and provide confidence to the organization that they are getting the most from their security operations center providers.

Read More

How Nettitude's next generation SOC can predict cyber attacks

Posted by Rowland Johnson on Nov 14, 2017 11:00:00 AM

There has been a theme for a while that categorizes security operations centers in to two categories of operation. Reactive capability, where the SOC purely reacts, and proactive capability, where the SOC has a proactive approach to identifying threats. Nettitude’s SOC harnesses both reactive and proactive approaches, however it also builds upon this through leveraging machine based learning to provide predictive capability.

Read More

5 things that highly effective CISOs do

Posted by Rowland Johnson on Nov 13, 2017 10:54:07 AM

As organizations become more dependent upon increasing amounts of data, many companies are hiring Chief Information Security Officers, (CISOs) to take on the responsibility of managing information security programs.

Read More

About Nettitude

Nettitude is the trusted cyber security provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

Our experts use an award winning Threat Intelligence led approach that incorporates real-time data, ensuring that your company is protected at every stage of its journey.

Receive an update when we post!

Recent Posts