Nettitude Blog

Should you choose a local or global TIBER test provider?

What is a Bug Bounty?

Process Hiving - Red Teaming Whitepaper

Why you never pass or fail a TIBER test

Ask an Expert: What is Ransomware? | Nettitude

How to Configure a Firewall Policy | Nettitude

How ICS Testing Protects Against Cybersecurity Threats | Nettitude

How JWT Hijacking Can Be Prevented | Nettitude

Why File Integrity Monitoring is Critical | Nettitude

Cybersecurity In a World Under Pressure – InfoSec 2021 Webinar | Nettitude

Why Hackers Target Healthcare with Cyber Attacks | Nettitude

How Endpoint Detection and Response can improve healthcare cybersecurity | Nettitude

Cybersecurity Trends – Evolve 2021 Webinar | Nettitude

Introducing the Nettitude Bug Bounty Programme | Nettitude

Nettitude Choose to Challenge | International Women’s Day 2021

Are You Protecting Your Critical Assets and Customer Data? | Nettitude

Healthcare Cyber Threats in IoT Devices | Nettitude

Protecting Against Encrypted Cyber Threats | Nettitude

Cloud Native Security- What you need to know

Why PCI DSS Training in Retail is Essential

How Can Banks Protect Themselves from Cyber Attacks? | Nettitude

AASE – Global Regulatory Frameworks Compared | Nettitude

MAS Announce New Rules in Singapore – what does this mean for businesses?

iCAST – Global Regulatory Frameworks Compared | Nettitude

The FireEye Hack | What can you do to protect your organisation?

How Security Awareness Training Can Reduce the Risk of Insider Threats | Nettitude

What is Alarm Fatigue in Cybersecurity? | Nettitude

Evidencing cybersecurity measures in ship architecture | Nettitude

SOC Alerts - Reducing False Positives & Negatives | Nettitude

TIBER-EU – Global Regulatory Frameworks Compared | Nettitude

How to Approach the IMO Cyber Requirements | Nettitude

6 Ways to Secure your Website with Pen Testing in 2020 | Nettitude

CBEST – Global Regulatory Frameworks Compared | Nettitude

Privilege Escalation Vulnerability- Electronic Arts (EA) Origin | Nettitude

The 3 Phases of an Incident Response Process | Nettitude

Nettitude Wins Back-to-Back Cybersecurity Breakthrough Award

What cyber-resilience measures are the regulators looking for from financial organisations? | Nettitude

APT Groups Exploiting COVID 19 Through Malware Campaigns | Nettitude

Evaluating Physical Security Controls with Pen Testing | Nettitude

An insight into how Artificial Intelligence is used in Penetration Testing | Nettitude

Endpoint Protection and Visibility – EPP & EDR | Nettitude

Technical Solutions for Data Loss Protection | Nettitude

The Clock is Ticking - Data Breach Response Times | Nettitude

The Importance of Pen Testing in Legacy Systems | Nettitude

Security Risks & Opportunities of Cloud Technology | Nettitude

An Exclusive Insight into the Security Operations Centre Vulnerability Management Programme | Nettitude

The SOC Visibility Triad – SIEM, EDR & NDR | Nettitude

How to use docker in your penetration testing endeavours | Nettitude

PCI Compliance – What have we learnt in 2020? | Nettitude

An Introduction to SOC Monitor Services| Nettitude

How to Prepare for the CMMC | Nettitude

The Cost of Malware & its Impact on Business | Nettitude

The Importance of Network Security Consulting | Nettitude

Nettitude's New CEO - What does this mean for our clients?

Cybersecurity and the Industrial Internet of Things: Protecting people, operations and systems | Nettitude

Press Release - Nettitude appoints Karen Bolton as new Chief Executive Officer

The State of Application Pen Testing

California Consumer Privacy Act (CCPA): The most rigorous privacy regulation so far?

The top cybersecurity issues for superyachts in 2020

Nettitude gain the STAR-FS accreditation

A Guide to the Fundamentals of Infrastructure Penetration Testing

The future of firewalls and their protection of business networks

How a Remote Cybersecurity Review Can Reduce Cyber-Risk

A technical assessment of a recent malicious email campaign against the Maritime sector

Cloud Penetration Testing - An Essential Guide

Elements of Managed Detection & Response

An Introduction to the Lloyd's Register Cybersecurity Framework

Sniffing Secrets – Sensitive Maritime Communications Broadcast on a Global Scale

Small Handling Errors in Incident Management

Top Security Threats to Cloud Computing in 2020

IACS New Recommendation on Cyber Resilience

Learning the Difference Between Vulnerability Testing vs. Penetration Testing

How Can Shipping Companies Mitigate Cyber Risk?

How to Configure your Identity and Access Management Controls (IAM)

What impact is the COVID-19 pandemic having on the cybersecurity of the Marine and Offshore Industries?

Vulnerabilities in JETSELECT Superyacht software

How to identify a data breach under GDPR

Why Every Disaster Recovery Plan Needs Incident Response (IR)

Cybersecurity Maturity Assessments Explained – With Nettitude’s Senior Security Consultant, Richard Hicks.

Cloud Series | The Key Principles and Challenges of Cloud Security

Four Types of Network Attacks to Protect Against in 2020

Cybersecurity and the Cloud Series – NIST Cybersecurity framework and cloud adoption

Social Media - Is it a Viable Source of Threat Intelligence?

Cyber Risks in Communication Systems Series: Key trends in technology vulnerabilities for the M&O sector

Cybersecurity and the Cloud Series – 5 steps for creating an effective cloud migration strategy

IoT Cybersecurity Threats – How Cybercriminals Target IoT | Nettitude

Enhanced Reconnaissance and the Three-Tier Acquisition Model – Live at CTIPs |Nettitude Events

Introducing CAA Assure | Aerospace Cybersecurity | Nettitude

Remote Access Solutions | Part 2 – Security challenges around remote communications at sea | Nettitude

Network Design & Configuration – 6 Key Factors | Nettitude

Cybersecurity and the Cloud Series – 4 key considerations to take when adopting cloud technology | Nettitude

Modern Ships – 6 Common Security Issues | Nettitude

Visit Nettitude at PCI London 2020 | Park Plaza Victoria

NotPetya Ransomware Attack on Maersk – Key Learnings | Nettitude

Remote Access Solutions | Part 1  - An overview of remote solutions at sea | Nettitude

Cyber Risks in Communication Systems Series:  Integration risks to communications technology for the M+O sector| Nettitude

Q&A with our Network Solutions Account Manager | Nettitude

Implementing the IMO Cybersecurity Requirements for Ships | Nettitude

The 5 Steps to an Effective Cybersecurity Strategy | Nettitude

Q&A With Our New Security and Network Solutions Account Manager | Nettitude

How Cyber Secure is Equipment used within the Marine and Offshore Industry?

GNSS Cyber Attacks: The Threat to the Marine and Offshore Industries

How AWS EC2 Backups Can Be Exfiltrated

The Top 8 Cyberthreats to Marine and Offshore Organisations, Part 3: GPS Jamming, Ransomware, and APT40

The Top 8 Cyberthreats to Marine and Offshore Organisations, Part 2: Piracy, ECDIS Malware, and VDR Tampering

How to Detect a Cyber Security Incident

The IMO Approach to Maritime Cyber Risk Management

Lloyd's Register and Nettitude have Released a New Procedure for the Assessment of Cyber Security Controls for Ships and Ship Systems

The Top 8 Cyberthreats to Marine and Offshore Organisations, Part 1: Phishing and Physical Infiltration

Securing Superyachts from Cyber Attack

Is Email Putting Marine and Offshore Organisations at Risk?

Tackling Cyber Threats in the Cruise Industry

ISO27701 & ISO27001: What's the Difference? And what does this mean for your Organisation?

Leaving the Armed Forces? Our Guide to going from Soldier to Cyber, Part 3

Leaving the Armed Forces? Our Guide to going from Soldier to Cyber, Part 2

Securing Remote Access Solutions for the Marine and Offshore Industries

Leaving the Armed Forces? Our Guide to going from Soldier to Cyber, Part 1

Zero day impacts: How marine and offshore organisations should prepare for unknown vulnerabilities

Is Third Party Expertise in Security Risk Management Necessary?

Cyber Attacks Reported by US Coast Guard

Tanker Cyber Attacks taking place in the Gulf

Globalising Cyber Security Regulation

Security testing: What should your business be doing?

Nettitude’s Q1 2019 PERCEPTION Report: What are the latest threats facing the financial sector?

Developing a Cyber Security Strategy: How do you plan for the inevitable?

Ransomware: Where are we now?

The future of IoT security and how to stay secure

What makes a strong password?

What Is Ransomware? Definite Guide

Cyber Security Threats

How To Build A Strategic Cyber Security Plan

Nettitude Takes 1st Place at DerbyCon 2018

Vulnerability Scanning Vs. Penetration Testing

The Importance of Cyber Security

Cyber Security vs. Information Security: Understanding The Difference

The Fundamentals of Web Application Security

How to effectively conduct a cyber security audit

Current Cybersecurity Threats And Emerging Trends

What Are You Doing To Reduce Cyber Risk?

The Ultimate Guide To Cyber Security Risk Assessments

Why risk management should underpin a cyber security strategy

A red teaming approach to PCI-DSS

7 Considerations of Cyber Insurance Coverage

5 Pitfalls around PCI DSS Service Providers

Ransomware - What to do if your device is infected

Ransomware - How to avoid becoming a victim

Future proofing the development of cryptocurrency

PCI DSS Service Providers beware – are you ready for 1st May 2018?

What to expect at the RSA Conference

How to manage a cyber attack

6 steps to creating a safe password

Building a secure future – Cyber security service provider Nettitude joins the Lloyd’s Register group

Perception Report; The threat landscape

Are you ready for GDPR? 

The dangers of public Wi-Fi

Women In Cyber Security 

Nettitude wins gold at Info Security PG's Global Excellence Awards

Cyber Activity News in the Finance Sector

What makes a good SOC?

The Singaporean Cyber Security Bill – A game changer  for the global information security industry?

Phishing scams and how they can affect your business.

7 Risk Assessments for PCI DSS

Perception Report; Financial Services Cyber Threat Briefing

PCI-DSS v3.2 is changing, are you ready?

Why you need to train your team in 2018

A quick guide to the Nettitude Security Operations Center

5 cyber security events that changed the industry in 2017

An insight into antivirus testing: are you protected by your endpoint security?

An insight into Deception Technologies

Nearly 4 Million Bitcoins Lost Forever, New Study Says

How $300 million worth of Ether was permanently locked up

How do you know if your SIEM/SOC is effective?

How Nettitude's next generation SOC can predict cyber attacks

5 things that highly effective CISOs do

Reducing dwell time for attackers, once they're in your network

SOC maturity - Setting standards for your SOC

5 things that every CISO should do to mitigate a data breach

5 reasons why organizations can't detect a cyber breach

Is penetration testing fit for purpose?

Red teaming and blue teaming is shaping detection and response

Why the evolution of penetration testing matters for you

5 things your current pen testing provider doesn't do

The cloud problem: How devastating can future breaches be?

Security awareness in the workplace

Red Team Testing: 10 reasons why you should be doing it

What the Equifax hack means for you

Threat detection in a borderless world

Cyber Security Month – The current climate

What is a Blockchain?

How to Monitor Your External Devices and Improve Your Alerts (pt.2)

How to monitor your external devices and improve your alerts (pt.1)

Android users still not ready to fully embrace security

4 Steps to take to analyse a phishing email

Nettitude is named Consulting Practice of the Year at the Cyber Security Awards 2017

Phishing Attacks - Is there another way in?

Nettitude ups its Incident Response game & joins FIRST

10 Steps to Successfully Manage Data Breaches

Nettitude CEO invited to present to UK Parliamentary Committee

10 Steps to prepare for a data breach

Network Operations Engineer

About Nettitude

Nettitude is the trusted cybersecurity provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

In 2018, Nettitude became part of The Lloyd's Register Group, an 8,000 person strong professional services organisation, with 300 years of heritage in safety and risk management. Nettitude now provides true global coverage, through a network of over 180 offices strategically placed around the globe.

Subscribe Here!

Recent Posts