Nettitude Blog

How a Remote Cybersecurity Review Can Reduce Cyber-Risk

A technical assessment of a recent malicious email campaign against the Maritime sector

Cloud Penetration Testing - An Essential Guide

Elements of Managed Detection & Response

An Introduction to the Lloyd's Register Cybersecurity Framework

Sniffing Secrets – Sensitive Maritime Communications Broadcast on a Global Scale

Small Handling Errors in Incident Management

Top Security Threats to Cloud Computing in 2020

IACS New Recommendation on Cyber Resilience

Learning the Difference Between Vulnerability Testing vs. Penetration Testing

How Can Shipping Companies Mitigate Cyber Risk?

How to Configure your Identity and Access Management Controls (IAM)

What impact is the COVID-19 pandemic having on the cybersecurity of the Marine and Offshore Industries?

Vulnerabilities in JETSELECT Superyacht software

How to identify a data breach under GDPR

Why Every Disaster Recovery Plan Needs Incident Response (IR)

Cybersecurity Maturity Assessments Explained – With Nettitude’s Senior Security Consultant, Richard Hicks.

Cloud Series | The Key Principles and Challenges of Cloud Security

Four Types of Network Attacks to Protect Against in 2020

Cybersecurity and the Cloud Series – NIST Cybersecurity framework and cloud adoption

Social Media - Is it a Viable Source of Threat Intelligence?

Cyber Risks in Communication Systems Series: Key trends in technology vulnerabilities for the M&O sector

Cybersecurity and the Cloud Series – 5 steps for creating an effective cloud migration strategy

IoT Cybersecurity Threats – How Cybercriminals Target IoT | Nettitude

Enhanced Reconnaissance and the Three-Tier Acquisition Model – Live at CTIPs |Nettitude Events

Introducing CAA Assure | Aerospace Cybersecurity | Nettitude

Remote Access Solutions | Part 2 – Security challenges around remote communications at sea | Nettitude

Network Design & Configuration – 6 Key Factors | Nettitude

Cybersecurity and the Cloud Series – 4 key considerations to take when adopting cloud technology | Nettitude

Modern Ships – 6 Common Security Issues | Nettitude

Visit Nettitude at PCI London 2020 | Park Plaza Victoria

NotPetya Ransomware Attack on Maersk – Key Learnings | Nettitude

Remote Access Solutions | Part 1  - An overview of remote solutions at sea | Nettitude

Cyber Risks in Communication Systems Series:  Integration risks to communications technology for the M+O sector| Nettitude

Q&A with our Network Solutions Account Manager | Nettitude

Implementing the IMO Cybersecurity Requirements for Ships | Nettitude

The 5 Steps to an Effective Cybersecurity Strategy | Nettitude

Q&A With Our New Security and Network Solutions Account Manager | Nettitude

How Cyber Secure is Equipment used within the Marine and Offshore Industry?

GNSS Cyber Attacks: The Threat to the Marine and Offshore Industries

How AWS EC2 Backups Can Be Exfiltrated

The Top 8 Cyberthreats to Marine and Offshore Organisations, Part 3: GPS Jamming, Ransomware, and APT40

The Top 8 Cyberthreats to Marine and Offshore Organisations, Part 2: Piracy, ECDIS Malware, and VDR Tampering

How to Detect a Cyber Security Incident

The IMO Approach to Maritime Cyber Risk Management

Lloyd's Register and Nettitude have Released a New Procedure for the Assessment of Cyber Security Controls for Ships and Ship Systems

The Top 8 Cyberthreats to Marine and Offshore Organisations, Part 1: Phishing and Physical Infiltration

Securing Superyachts from Cyber Attack

Is Email Putting Marine and Offshore Organisations at Risk?

Tackling Cyber Threats in the Cruise Industry

ISO27701 & ISO27001: What's the Difference? And what does this mean for your Organisation?

Leaving the Armed Forces? Our Guide to going from Soldier to Cyber, Part 3

Leaving the Armed Forces? Our Guide to going from Soldier to Cyber, Part 2

Securing Remote Access Solutions for the Marine and Offshore Industries

Leaving the Armed Forces? Our Guide to going from Soldier to Cyber, Part 1

Zero day impacts: How marine and offshore organisations should prepare for unknown vulnerabilities

Is Third Party Expertise in Security Risk Management Necessary?

Cyber Attacks Reported by US Coast Guard

Tanker Cyber Attacks taking place in the Gulf

Globalising Cyber Security Regulation

Security testing: What should your business be doing?

Nettitude’s Q1 2019 PERCEPTION Report: What are the latest threats facing the financial sector?

Developing a Cyber Security Strategy: How do you plan for the inevitable?

Ransomware: Where are we now?

The future of IoT security and how to stay secure

What makes a strong password?

What Is Ransomware? Definite Guide

Cyber Security Threats

How To Build A Strategic Cyber Security Plan

Nettitude Takes 1st Place at DerbyCon 2018

Vulnerability Scanning Vs. Penetration Testing

The Importance of Cyber Security

Cyber Security vs. Information Security: Understanding The Difference

The Fundamentals of Web Application Security

How to effectively conduct a cyber security audit

Current Cybersecurity Threats And Emerging Trends

What Are You Doing To Reduce Cyber Risk?

The Ultimate Guide To Cyber Security Risk Assessments

Why risk management should underpin a cyber security strategy

A red teaming approach to PCI-DSS

7 Considerations of Cyber Insurance Coverage

5 Pitfalls around PCI DSS Service Providers

Ransomware - What to do if your device is infected

Ransomware - How to avoid becoming a victim

Future proofing the development of cryptocurrency

PCI DSS Service Providers beware – are you ready for 1st May 2018?

What to expect at the RSA Conference

How to manage a cyber attack

6 steps to creating a safe password

Building a secure future – Cyber security service provider Nettitude joins the Lloyd’s Register group

Perception Report; The threat landscape

Are you ready for GDPR? 

The dangers of public Wi-Fi

Women In Cyber Security 

Nettitude wins gold at Info Security PG's Global Excellence Awards

Cyber Activity News in the Finance Sector

What makes a good SOC?

The Singaporean Cyber Security Bill – A game changer  for the global information security industry?

Phishing scams and how they can affect your business.

7 Risk Assessments for PCI DSS

Perception Report; Financial Services Cyber Threat Briefing

PCI-DSS v3.2 is changing, are you ready?

Why you need to train your team in 2018

A quick guide to the Nettitude Security Operations Center

5 cyber security events that changed the industry in 2017

An insight into antivirus testing: are you protected by your endpoint security?

An insight into Deception Technologies

Nearly 4 Million Bitcoins Lost Forever, New Study Says

How $300 million worth of Ether was permanently locked up

How do you know if your SIEM/SOC is effective?

How Nettitude's next generation SOC can predict cyber attacks

5 things that highly effective CISOs do

Reducing dwell time for attackers, once they're in your network

SOC maturity - Setting standards for your SOC

5 things that every CISO should do to mitigate a data breach

5 reasons why organizations can't detect a cyber breach

Is penetration testing fit for purpose?

Red teaming and blue teaming is shaping detection and response

Why the evolution of penetration testing matters for you

5 things your current pen testing provider doesn't do

The cloud problem: How devastating can future breaches be?

Security awareness in the workplace

Red Team Testing: 10 reasons why you should be doing it

What the Equifax hack means for you

Threat detection in a borderless world

Cyber Security Month – The current climate

What is a Blockchain?

How to Monitor Your External Devices and Improve Your Alerts (pt.2)

How to monitor your external devices and improve your alerts (pt.1)

Android users still not ready to fully embrace security

4 Steps to take to analyse a phishing email

Nettitude is named Consulting Practice of the Year at the Cyber Security Awards 2017

Phishing Attacks - Is there another way in?

Nettitude ups its Incident Response game & joins FIRST

10 Steps to Successfully Manage Data Breaches

Nettitude CEO invited to present to UK Parliamentary Committee

10 Steps to prepare for a data breach

Network Operations Engineer

5 Steps to Cyber Defense Post PCI DSS

A recap of RSA 2017

Pre-Sales Consultant

PCI DSS v3.2 - The One Year Countdown has begun! Again?

Nettitude partners with Parliament as Cyber Security Month gets underway

Soldier to Cyber

An advance look at RSA 2017

The Big Freeze Is Coming – PCI DSS and change freezes

Cyber Threat Update 14-21 November 2016

Drive My Information Security Car

Global statistics: An insight in to Nettitude's latest honeypot findings

The Accelerator Scheme

Nettitude Wins US Mutual Fund Services Awards 2016

Nettitude researchers expose botnet and reveal regional malware trends in new report

Crest Signs Cyber Security Incident Response Agreement with NSA Nettitude Becomes A Founding Member of New US Chapter

Nettitude warns of DDoS Extortion and Ransomware campaign targeting the Financial Sector

The Potential Impact of PSD2 on E-Commerce Merchants

Building your PCI DSS Castle

Nettitude Wins Consulting Practice of the Year at the Cyber Security Awards

Nettitude releases global threat activity analysis in its first cyber briefing for the financial services industry

New PETRAS IoT Website Launched

24 x 7 SOCs: The Answer to your Monitoring & Logging needs?

QNAP Android: Don't Over Provide

PCI DSS: The Best Show In Town

The PCI DSS Comes of Age - v3.2

Outsourcing Responsibility: The 3 Wise Monkeys

Escaping The Avast Sandbox Using A Single IOCTL

Data: The Life Blood Of Any Company!

Panda Security 2016 Home User Products - Privilege Escalation

Panda Security Multiple Business Products - Privilege Escalation

The Great PCI DSS Bake Off!

PCI Data Security: Is Yours Fit For The Scrap Yard?

QNAP Signage Station iArtist: SYSTEM for Everyone (Part 3)

Nettitude Gains CBEST Approved Threat Intelligence Provider Status

QNAP Signage Station: Publish and Be Damned (Part 2)

QNAP Signage Station: Publish and Be Damned (Part 1)

Exploiting a Kernel Paged Pool Buffer Overflow in Avast Virtualization Driver

Award News: Nettitude’s Threat2Alert Shortlisted For Techies Award!

The Logan's Run Effect

Data Safety: What Are The Critical Security Controls, And Why Do You Need Them?

HMRC Phishing Scam

McAfee File Lock Driver - Kernel Memory Leak

McAfee File Lock Driver - Kernel Stack Based BOF

For Health And Glory: "Hacker Ergonomics"

EU General Data Protection Regulation (GDPR): What You Need To Know?

Security Awareness Training: What’s The Problem?

CVE-2015-5243 phpWhois Remote Code Execution

Nettitude Announces Availability Of Services On G-Cloud

A Guide to Starting the PCI DSS Process

The Edge of Reason: Why a new perimeter is needed for your networks

In Cyber Space, there IS such a thing as bad publicity

New Threat Advisory Report: Nettitude finds malicious content embedded in image files

Nettitude’s new Cyber Threat Intelligence report reveals increase in targeted phishing emails

Technical Analysis of ELF/Spylock.A Malware for GNU/Linux

Pony malware two years later

Thinking like a programmer for PCI compliance excellence

Dridex Malware Steals Millions from Online Bank Accounts

New Malware Targets Financial Data

Why small businesses struggle with information security

CREST, CSA & AISP Work Together To Introduce Penetration Testing Certifications in Singapore

Malware Manual Unpacking - [Custom + UPX]

Vulnerability discovered in unsupported Cisco Systems VPN Client

About Nettitude

Nettitude is the trusted cybersecurity provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

In 2018, Nettitude became part of Lloyd’s Register, an 8,000 person strong professional services organisation, with 300 years of heritage in safety and risk management. Nettitude now provides true global coverage, through a network of over 180 offices strategically placed around the globe.

Subscribe Here!

Recent Posts