LRQA Nettitude Blog

LRQA Nettitude at 2024 FS-ISAC APAC Summit: Blockchain and Smart Contract Security for Protecting Digital Assets in Finance

What is DORA: Digital Operational Resilience Act | LRQA Nettitude

Mitigating false positives in vulnerability scanning: A managed service approach | LRQA Nettitude

What is Pharming and How to Prevent an Attack | LRQA Nettitude

Cybersecurity hidden costs to watch out for | LRQA Nettitude

Phishing: It’s not just about email

How to Prepare for ISO 27001 Certification

Testing Your Cyber Incident Response Procedure

Cybersecurity Know-How: Protecting Your Mobile Apps

What is Threat Modelling? | LRQA Nettitude

Deception as a method of early detection | LRQA Nettitude

How to Recover From a Data Breach: The Steps To Take

7 Cybersecurity Best Practices for Employees

PCI DSS 4.0 Migration for Merchants and Service Providers | LRQA Nettitude

Challenges of Meeting ASV Scanning Requirements in PCI 4.0 | LRQA Nettitude

The Dangers of Social Engineering Attacks in Cybersecurity | Nettitude

Security Excellence Awards 2023 Rising Star Interviews | Nettitude

What are the Different Types of Cybersecurity Testing? | Nettitude

The Cybersecurity Threats to Email: Explained | Nettitude

How to Secure Your API Against Cyber Attacks | Nettitude

Benefits of Performing Code Reviews | Nettitude

PCI DSS v4.0 and SAQ A | Nettitude

SAQs and the impact of PCI DSS v4.0 | Nettitude

Digital Footprint and Why it Matters to Your Organisation | Nettitude

An Introduction to Zero-Click Attacks | Nettitude

Security Considerations in AWS | Nettitude

Building Baseline Security in the Cloud | Nettitude

What is Pretexting in Cybersecurity? | Nettitude

How have Ransomware Attacks Evolved? | Nettitude

How to Prevent Ransomware & Protect Your Business | Nettitude

How to Create a Cyber Incident Response Plan | Nettitude

Steps to reduce alert fatigue in your cybersecurity team | Nettitude

How to Reduce Your Attack Surface - Just How Big Is It? | Nettitude

What are the 3 Types of Vulnerability Scanning? | Nettitude

What is Vulnerability Management & Scanning? | Nettitude

The Difference Between Information & Intelligence | Nettitude

Is Your Business Prepared for a Data Breach? | Nettitude

What Is Cyber Threat Intelligence & How Is It Used? | Nettitude

File Integrity Monitoring - What It Is & FAQs | Nettitude

How We Found a Second Critical Microsoft VPN Vulnerability | Nettitude Blog

Nettitude discovers critical Microsoft VPN vulnerability resulting in essential patch | Nettitude Blog

Our Guide On OWASP ASVS | Award-Winning Cybersecurity

The Future of E-commerce: How Retail Cybersecurity Is Evolving | Nettitude

Why Marine Vessel Owners Should Consider LR Cybersecurity ShipRight Certification | Nettitude

PCI DSS V4.0 – 6 Things You Need To Know | Nettitude

Nettitude discovers high-risk Microsoft vulnerability

Cybersecurity Training for Employees: How to Safeguard Your Organisation | Nettitude

4 Ways to Detect Phishing Attempts: Email Protection 101 | Nettitude

Firewall Penetration Testing: What it Entails | Nettitude

How To Prevent Ransomware Attacks | Nettitude

What is the Log4Shell Vulnerability and how can you protect against it?

CMMC 2.0: It’s not an admission of defeat, but a tactical retreat | LRQA Nettitude

Bug Bounty vs Pen Testing - What's the Difference? | Nettitude

What Is Ransomware & How Does It Work? | Nettitude

5 Benefits of Bug Bounty Programs | Nettitude

Should you choose a local or global TIBER test provider?

What is a Bug Bounty?

Process Hiving - Red Teaming Whitepaper

Why you never pass or fail a TIBER test

How JWT Hijacking Can Be Prevented | LRQA Nettitude

How Endpoint Detection and Response can improve healthcare cybersecurity | Nettitude

Introducing our Bug Bounty Programme | LRQA Nettitude

Nettitude Choose to Challenge | International Women’s Day 2021

Healthcare Cyber Threats in IoT Devices | Nettitude

Protecting Against Encrypted Cyber Threats | Nettitude

Cloud Native Security- What you need to know

Why PCI DSS Training in Retail is Essential

How Can Banks Protect Themselves from Cyber-Attacks? | LRQA Nettitude

AASE – Global Regulatory Frameworks Compared | Nettitude

MAS Announce New Rules in Singapore – what does this mean for businesses?

iCAST – Global Regulatory Frameworks Compared | LRQA Nettitude

The FireEye Hack | What can you do to protect your organisation?

How Security Awareness Training Can Reduce the Risk of Insider Threats | Nettitude

What is Alarm Fatigue in Cybersecurity? | Nettitude

Evidencing cybersecurity measures in ship architecture | Nettitude

SOC Alerts - Reducing False Positives & Negatives

TIBER-EU – Global Regulatory Frameworks Compared

How to Approach the IMO Cyber Requirements | Nettitude

6 Ways to Secure your Website with Pen Testing | LRQA Nettitude

CBEST – Global Regulatory Frameworks Compared

Privilege Escalation Vulnerability- Electronic Arts (EA) Origin | Nettitude

The 3 Phases of an Incident Response Process | Nettitude

What cyber-resilience measures are the regulators looking for from financial organisations? | LRQA Nettitude

APT Groups Exploiting COVID 19 Through Malware Campaigns | Nettitude

Evaluating Physical Security Controls with Pen Testing

An insight into how Artificial Intelligence is used in Penetration Testing

Endpoint Protection and Visibility – EPP & EDR | Nettitude

Technical Solutions for Data Loss Protection | Nettitude

The Clock is Ticking - Data Breach Response Times | Nettitude

The Importance of Pen Testing in Legacy Systems | LRQA Nettitude

Security Risks & Opportunities of Cloud Technology | Nettitude

An Exclusive Insight into the Security Operations Centre Vulnerability Management Programme | Nettitude

The SOC Visibility Triad – SIEM, EDR & NDR | LRQA Nettitude

How to use docker in your penetration testing endeavours | LRQA Nettitude

PCI Compliance – What have we learnt in 2020? | Nettitude

An Introduction to SOC Monitor Services| LRQA Nettitude

How to Prepare for the CMMC | LRQA Nettitude

The Cost of Malware and its Impact on Business | LRQA Nettitude

The Importance of Network Security Consulting | Nettitude

Nettitude's New CEO - What does this mean for our clients?

Cybersecurity and the Industrial Internet of Things: Protecting people, operations and systems | Nettitude

Press Release - Nettitude appoints Karen Bolton as new Chief Executive Officer

The State of Application Pen Testing

California Consumer Privacy Act (CCPA): The most rigorous privacy regulation so far?

The top cybersecurity issues for superyachts in 2020

Nettitude gain the STAR-FS accreditation

A Guide to the Fundamentals of Infrastructure Penetration Testing

The future of firewalls and their protection of business networks

How a Remote Cybersecurity Review Can Reduce Cyber-Risk

A technical assessment of a recent malicious email campaign against the Maritime sector

Cloud Penetration Testing - An Essential Guide

Elements of Managed Detection & Response

An Introduction to the Lloyd's Register Cybersecurity Framework

Sniffing Secrets – Sensitive Maritime Communications Broadcast on a Global Scale

Small Handling Errors in Incident Management

Top Security Threats to Cloud Computing in 2020

Learning the Difference Between Vulnerability Testing vs. Penetration Testing

How Can Shipping Companies Mitigate Cyber Risk?

How to Configure your Identity and Access Management Controls (IAM)

What impact is the COVID-19 pandemic having on the cybersecurity of the Marine and Offshore Industries?

Vulnerabilities in JETSELECT Superyacht software

How to identify a data breach under GDPR

Why Every Disaster Recovery Plan Needs Incident Response (IR)

Cybersecurity Maturity Assessments Explained – With Nettitude’s Senior Security Consultant, Richard Hicks.

Cloud Series | The Key Principles and Challenges of Cloud Security

Four Types of Network Attacks to Protect Against in 2020

Cybersecurity and the Cloud Series – NIST Cybersecurity framework and cloud adoption

Social Media - Is it a Viable Source of Threat Intelligence?

Cyber Risks in Communication Systems Series: Key trends in technology vulnerabilities for the M&O sector

Cybersecurity and the Cloud Series – 5 steps for creating an effective cloud migration strategy

IoT Cybersecurity Threats – How Cybercriminals Target IoT | Nettitude

Introducing CAA Assure | Aerospace Cybersecurity | Nettitude

Remote Access Solutions | Part 2 – Security challenges around remote communications at sea | Nettitude

Network Design & Configuration – 6 Key Factors

Cybersecurity and the Cloud Series – 4 key considerations to take when adopting cloud technology | Nettitude

Modern Ships – 6 Common Security Issues | Nettitude

Visit Nettitude at PCI London 2020 | Park Plaza Victoria

NotPetya Ransomware Attack on Maersk – Key Learnings | LRQA Nettitude

Remote Access Solutions | Part 1  - An overview of remote solutions at sea | Nettitude

Cyber Risks in Communication Systems Series: Integration risks to communications technology for the M+O sector | Nettitude

Q&A with our Network Solutions Account Manager | Nettitude

The 5 Steps to an Effective Cybersecurity Strategy | Nettitude

Q&A With Our New Security and Network Solutions Account Manager | Nettitude

How Cyber Secure is Equipment used within the Marine and Offshore Industry?

GNSS Cyber Attacks: The Threat to the Marine and Offshore Industries

How AWS EC2 Backups Can Be Exfiltrated

ISO27701 & ISO27001: What's the Difference? And what does this mean for your Organisation?

Zero day impacts: How marine and offshore organisations should prepare for unknown vulnerabilities

The future of IoT security and how to stay secure

What makes a strong password?

What Is Ransomware? Definite Guide

How To Build A Strategic Cybersecurity Plan

Vulnerability Scanning Vs. Penetration Testing

The Importance of Cyber Security

Cyber Security vs. Information Security: Understanding The Difference

The Fundamentals of Web Application Security

How To Effectively Conduct A Cybersecurity Audit

Current Cybersecurity Threats And Emerging Trends

What Are You Doing To Reduce Cyber Risk?

The Ultimate Guide To Cybersecurity Risk Assessments

A red teaming approach to PCI-DSS

7 Considerations of Cyber Insurance Coverage

5 Pitfalls around PCI DSS Service Providers

Ransomware - What to do if your device is infected

Future proofing the development of cryptocurrency

Women In Cybersecurity

7 Risk Assessments for PCI DSS

How do you know if your SIEM/SOC is effective?

SOC maturity - Setting standards for your SOC

5 things that every CISO should do to mitigate a data breach

5 reasons why organizations can't detect a cyber breach

Red Team Testing: 10 reasons why you should be doing it

What is a Blockchain?

How to monitor your external devices and improve your alerts (pt.1)

4 Steps to take to analyse a phishing email

10 Steps to prepare for a data breach

Building your PCI DSS Castle

24 x 7 SOCs: The Answer to your Monitoring & Logging needs?

QNAP Android: Don't Over Provide

The PCI DSS Comes of Age - v3.2

Exploiting a Kernel Paged Pool Buffer Overflow in Avast Virtualization Driver

CVE-2015-5243 phpWhois Remote Code Execution

A Guide to Starting the PCI DSS Process

CREST, CSA & AISP Work Together To Introduce Penetration Testing Certifications in Singapore

Malware Manual Unpacking - [Custom + UPX]

CVE-2015-5227: Zeropress and Remote Code Execution in the WordPress Landing Pages Plugin

Rocktastic

Easy Compliance – The PCI Pills

Cyber Fighting Power – Who Has The Upper Hand?

Companies with poor Cyber Security at risk of action by FTC

Fuzzing with American Fuzzy Lop (AFL)

Context Triggered Piecewise Hashing To Detect Malware Similarity

The Prestige in Malware Persistence

Eight Things To Consider Before Deploying Cyber Threat Intelligence

CSRF And Unsafe Arbitrary File Upload In NextGEN Gallery Plugin (2.0.77.0) For WordPress

Windows Inline Function Hooking

DLL Injection: Part Two

DLL Injection: Part One

Traditional Wireless Vs. Cloud Wireless Solutions

A Beginners’ Guide to Obfuscation

Subscribe Here!

About LRQA Nettitude

Through our connected portfolio of advanced cybersecurity solutions, LRQA Nettitude helps companies to identify and manage the vulnerabilities and threats that pose a risk to their business, building cybersecurity resilience and underpinning your business strategy with proactive measures.

Recent Posts

Posts by Tag

See all