Nettitude Blog

Cloud Series | The Key Principles and Challenges of Cloud Security

Four Types of Network Attacks to Protect Against in 2020

Cybersecurity and the Cloud Series – NIST Cybersecurity framework and cloud adoption

Social Media - Is it a Viable Source of Threat Intelligence?

Cyber Risks in Communication Systems Series: Key trends in technology vulnerabilities for the M&O sector

Cybersecurity and the Cloud Series – 5 steps for creating an effective cloud migration strategy

IoT Cybersecurity Threats – How Cybercriminals Target IoT | Nettitude

Enhanced Reconnaissance and the Three-Tier Acquisition Model – Live at CTIPs |Nettitude Events

Introducing CAA Assure | Aerospace Cybersecurity | Nettitude

Remote Access Solutions | Part 2 – Security challenges around remote communications at sea | Nettitude

Network Design & Configuration – 6 Key Factors | Nettitude

Cybersecurity and the Cloud Series – 4 key considerations to take when adopting cloud technology | Nettitude

Modern Ships – 6 Common Security Issues | Nettitude

Visit Nettitude at PCI London 2020 | Park Plaza Victoria

NotPetya Ransomware Attack on Maersk – Key Learnings | Nettitude

Remote Access Solutions | Part 1  - An overview of remote solutions at sea | Nettitude

Cyber Risks in Communication Systems Series:  Integration risks to communications technology for the M+O sector| Nettitude

Q&A with our Network Solutions Account Manager | Nettitude

Implementing the IMO Cybersecurity Requirements for Ships | Nettitude

The 5 Steps to an Effective Cybersecurity Strategy | Nettitude

Q&A With Our New Security and Network Solutions Account Manager | Nettitude

How Cyber Secure is Equipment used within the Marine and Offshore Industry?

GNSS Cyber Attacks: The Threat to the Marine and Offshore Industries

How AWS EC2 Backups Can Be Exfiltrated

The Top 8 Cyberthreats to Marine and Offshore Organisations, Part 3: GPS Jamming, Ransomware, and APT40

The Top 8 Cyberthreats to Marine and Offshore Organisations, Part 2: Piracy, ECDIS Malware, and VDR Tampering

How to Detect a Cyber Security Incident

The IMO Approach to Maritime Cyber Risk Management

Lloyd's Register and Nettitude have Released a New Procedure for the Assessment of Cyber Security Controls for Ships and Ship Systems

The Top 8 Cyberthreats to Marine and Offshore Organisations, Part 1: Phishing and Physical Infiltration

Securing Superyachts from Cyber Attack

Is Email Putting Marine and Offshore Organisations at Risk?

Tackling Cyber Threats in the Cruise Industry

ISO27701 & ISO27001: What's the Difference? And what does this mean for your Organisation?

Leaving the Armed Forces? Our Guide to going from Soldier to Cyber, Part 3

Leaving the Armed Forces? Our Guide to going from Soldier to Cyber, Part 2

Securing Remote Access Solutions for the Marine and Offshore Industries

Leaving the Armed Forces? Our Guide to going from Soldier to Cyber, Part 1

Zero day impacts: How marine and offshore organisations should prepare for unknown vulnerabilities

Is Third Party Expertise in Security Risk Management Necessary?

Cyber Attacks Reported by US Coast Guard

Tanker Cyber Attacks taking place in the Gulf

Globalising Cyber Security Regulation

Security testing: What should your business be doing?

Nettitude’s Q1 2019 PERCEPTION Report: What are the latest threats facing the financial sector?

Developing a Cyber Security Strategy: How do you plan for the inevitable?

Ransomware: Where are we now?

The future of IoT security and how to stay secure

What makes a strong password?

What Is Ransomware? Definite Guide

Cyber Security Threats

How To Build A Strategic Cyber Security Plan

Nettitude Takes 1st Place at DerbyCon 2018

Vulnerability Scanning Vs. Penetration Testing

The Importance of Cyber Security

Cyber Security vs. Information Security: Understanding The Difference

The Fundamentals of Web Application Security

How to effectively conduct a cyber security audit

Current Cybersecurity Threats And Emerging Trends

What Are You Doing To Reduce Cyber Risk?

The Ultimate Guide To Cyber Security Risk Assessments

Why risk management should underpin a cyber security strategy

A red teaming approach to PCI-DSS

7 Considerations of Cyber Insurance Coverage

5 Pitfalls around PCI DSS Service Providers

Ransomware - What to do if your device is infected

Ransomware - How to avoid becoming a victim

Future proofing the development of cryptocurrency

PCI DSS Service Providers beware – are you ready for 1st May 2018?

What to expect at the RSA Conference

How to manage a cyber attack

6 steps to creating a safe password

Building a secure future – Cyber security service provider Nettitude joins the Lloyd’s Register group

Perception Report; The threat landscape

Are you ready for GDPR? 

The dangers of public Wi-Fi

Women In Cyber Security 

Nettitude wins gold at Info Security PG's Global Excellence Awards

Cyber Activity News in the Finance Sector

What makes a good SOC?

The Singaporean Cyber Security Bill – A game changer  for the global information security industry?

Phishing scams and how they can affect your business.

7 Risk Assessments for PCI DSS

Perception Report; Financial Services Cyber Threat Briefing

PCI-DSS v3.2 is changing, are you ready?

Why you need to train your team in 2018

A quick guide to the Nettitude Security Operations Center

5 cyber security events that changed the industry in 2017

An insight into antivirus testing: are you protected by your endpoint security?

An insight into Deception Technologies

Nearly 4 Million Bitcoins Lost Forever, New Study Says

How $300 million worth of Ether was permanently locked up

How do you know if your SIEM/SOC is effective?

How Nettitude's next generation SOC can predict cyber attacks

5 things that highly effective CISOs do

Reducing dwell time for attackers, once they're in your network

SOC maturity - Setting standards for your SOC

5 things that every CISO should do to mitigate a data breach

5 reasons why organizations can't detect a cyber breach

Is penetration testing fit for purpose?

Red teaming and blue teaming is shaping detection and response

Why the evolution of penetration testing matters for you

5 things your current pen testing provider doesn't do

The cloud problem: How devastating can future breaches be?

Security awareness in the workplace

Red Team Testing: 10 reasons why you should be doing it

What the Equifax hack means for you

Threat detection in a borderless world

Cyber Security Month – The current climate

What is a Blockchain?

How to Monitor Your External Devices and Improve Your Alerts (pt.2)

How to monitor your external devices and improve your alerts (pt.1)

Android users still not ready to fully embrace security

4 Steps to take to analyse a phishing email

Nettitude is named Consulting Practice of the Year at the Cyber Security Awards 2017

Phishing Attacks - Is there another way in?

Nettitude ups its Incident Response game & joins FIRST

10 Steps to Successfully Manage Data Breaches

Nettitude CEO invited to present to UK Parliamentary Committee

10 Steps to prepare for a data breach

Network Operations Engineer

5 Steps to Cyber Defense Post PCI DSS

A recap of RSA 2017

Pre-Sales Consultant

PCI DSS v3.2 - The One Year Countdown has begun! Again?

Nettitude partners with Parliament as Cyber Security Month gets underway

Soldier to Cyber

An advance look at RSA 2017

The Big Freeze Is Coming – PCI DSS and change freezes

Cyber Threat Update 14-21 November 2016

Drive My Information Security Car

Global statistics: An insight in to Nettitude's latest honeypot findings

The Accelerator Scheme

Nettitude Wins US Mutual Fund Services Awards 2016

Nettitude researchers expose botnet and reveal regional malware trends in new report

Crest Signs Cyber Security Incident Response Agreement with NSA Nettitude Becomes A Founding Member of New US Chapter

Nettitude warns of DDoS Extortion and Ransomware campaign targeting the Financial Sector

The Potential Impact of PSD2 on E-Commerce Merchants

Building your PCI DSS Castle

Nettitude Wins Consulting Practice of the Year at the Cyber Security Awards

Nettitude releases global threat activity analysis in its first cyber briefing for the financial services industry

New PETRAS IoT Website Launched

24 x 7 SOCs: The Answer to your Monitoring & Logging needs?

QNAP Android: Don't Over Provide

PCI DSS: The Best Show In Town

The PCI DSS Comes of Age - v3.2

Outsourcing Responsibility: The 3 Wise Monkeys

Escaping The Avast Sandbox Using A Single IOCTL

Data: The Life Blood Of Any Company!

Panda Security 2016 Home User Products - Privilege Escalation

Panda Security Multiple Business Products - Privilege Escalation

The Great PCI DSS Bake Off!

PCI Data Security: Is Yours Fit For The Scrap Yard?

QNAP Signage Station iArtist: SYSTEM for Everyone (Part 3)

Nettitude Gains CBEST Approved Threat Intelligence Provider Status

QNAP Signage Station: Publish and Be Damned (Part 2)

QNAP Signage Station: Publish and Be Damned (Part 1)

Exploiting a Kernel Paged Pool Buffer Overflow in Avast Virtualization Driver

Award News: Nettitude’s Threat2Alert Shortlisted For Techies Award!

The Logan's Run Effect

Data Safety: What Are The Critical Security Controls, And Why Do You Need Them?

HMRC Phishing Scam

McAfee File Lock Driver - Kernel Memory Leak

McAfee File Lock Driver - Kernel Stack Based BOF

For Health And Glory: "Hacker Ergonomics"

EU General Data Protection Regulation (GDPR): What You Need To Know?

Security Awareness Training: What’s The Problem?

CVE-2015-5243 phpWhois Remote Code Execution

Nettitude Announces Availability Of Services On G-Cloud

A Guide to Starting the PCI DSS Process

The Edge of Reason: Why a new perimeter is needed for your networks

In Cyber Space, there IS such a thing as bad publicity

New Threat Advisory Report: Nettitude finds malicious content embedded in image files

Nettitude’s new Cyber Threat Intelligence report reveals increase in targeted phishing emails

Technical Analysis of ELF/Spylock.A Malware for GNU/Linux

Pony malware two years later

Thinking like a programmer for PCI compliance excellence

Dridex Malware Steals Millions from Online Bank Accounts

New Malware Targets Financial Data

Why small businesses struggle with information security

CREST, CSA & AISP Work Together To Introduce Penetration Testing Certifications in Singapore

Malware Manual Unpacking - [Custom + UPX]

Vulnerability discovered in unsupported Cisco Systems VPN Client

CVE-2015-5227: Zeropress and Remote Code Execution in the WordPress Landing Pages Plugin

Lancaster University And Nettitude Agree Strategic Cyber Security Research Partnership


Nettitude Awarded ‘Managed Security Service Provider Partner Of The Year’ By LogRhythm

Easy Compliance – The PCI Pills

Catch Nettitude on NBC

Reducing The Attack Surface: A Human Error Perspective

Cyber Fighting Power – Who Has The Upper Hand?

If You Can’t Be Red And Blue… Go Purple?...

Black Hat 2015 Wrap Up – Part II

Companies with poor Cyber Security at risk of action by FTC

Black Hat 2015 Wrap Up – Part I

Black Hat 2015 Wrap Up – Part I

The Ashley Madison Saga Continues

Nettitude Uncovers WordPress Vulnerabilities

Fuzzing with American Fuzzy Lop (AFL)

Nettitude’s Ben Rothke Appointed to the 2016 Cybersecurity Canon Committee

VMware Multiple Products - Privilege Escalation

The Problem of Data Loss Intelligence

Success For Nettitude At The Cyber Security Awards

Context Triggered Piecewise Hashing To Detect Malware Similarity

Nettitude Wins Coventry Telegraph Business Award!

Shellter – A Dynamic Shellcode Injector

The Prestige in Malware Persistence

VoIP attacks are on the rise, particularly in the UK, according to new research by Nettitude

Eight Things To Consider Before Deploying Cyber Threat Intelligence

Awards News: Nettitude Shortlisted For Coventry Telegraph Business, Computing Vendor Excellence & Not One, But Two Cyber Security Awards!

Custom Content Type Manager Remote Code Execution

Nettitude Releases NEW eBook: CBEST Demystified

My RSA 2015 Recap

Malware Is Changing Daily! Are You Still Protected?

Loading A Weaponised Interactive PowerShell Session With Metasploit

Input Blacklisting – Is It Ever The Correct Approach?

Nettitude To Attend RSA Conference 2015

QNAP NAS – Remote Unauthenticated User to Admin Shell: Part 2

QNAP NAS – Remote Unauthenticated User To Admin Shell: Part 1

Network Security Monitoring With Bro IDS, TCPDump And MongoDB

Nettitude Furthers R&D Capability With Strategic Appointment

CSRF And Unsafe Arbitrary File Upload In NextGEN Gallery Plugin ( For WordPress

Windows Inline Function Hooking

Nettitude Shortlisted For Two SC Magazine Europe Awards!

Vulnerability Discovery Via 'Fuzzing'

Nettitude Holds First Internal Conference, NettiCon

DLL Injection: Part Two

DLL Injection: Part One

Traditional Wireless Vs. Cloud Wireless Solutions

A Beginners’ Guide to Obfuscation

What Is DLP And Why Is It Important?

Programmable Logic Controller (PLC) Security

It's Christmas! Don’t let malware get in your way

NY Banks Take Big Steps to Harden Security Posture

Bypassing AV The Easy Way

Nettitude Achieves CBEST Accreditation

Cyber Breaches - Response In Depth (RID)

SSL 3.0 ‘Poodle’ Bug Discovered By Google Researchers

Nettitude Awarded STAR (Simulated Targeted Attack and Response) Status by CREST

Windows Users At Risk From 'SandWorm' Vulnerability

Nettitude Wins 2014 Computing Security Award

Nettitude Wins 2014 Computing Security Award

Shellshock (CVE-2014-6271) – The Next Major Vulnerability To Hit The Cyber Community…

The Internet Of Things (IoT)

eBay Hit By Cross-Site Scripting (XSS) Attack

Chris White, MP for Warwick and Leamington visits Nettitude

Nettitude Achieves ‘6 Star’ Penetration Testing Accreditation

Mobile Device Security In The Workplace – BYOD Considerations

Nettitude Shortlisted in Computing Security Awards 2014

Security Awareness Training Is Crucial

Does Enforcing A Strong Password Policy Make Any Difference?

Russian Password Thefts Highlight Need For ‘Response In Depth’

A Guide To ISO 27001

AWS Summit NYC 2014

Becoming A Graduate Security Consultant At Nettitude

How To Mitigate DDoS

What Is APT Testing?

Why You Cannot Afford To Ignore 2-Factor Authentication

Five Steps Towards Cyber Breach Preparation

BSIDES MANCHESTER – 27 & 28 June 2014


UK Government & Regulators Demonstrate Importance Of Cyber

New York State Cyber Security Conference

Responding To The Gameover ZeuS Botnet

Server Side Request Forgery

Nettitude Inks Reseller Agreement With Digital Shadows

eBay Suffers Breach After Cyber Attack

New Cyber Managed Service Launches

Nettitude CEO Becomes CREST Executive

Nettitude Sponsor Football Stars Of The Future

The Independent Features Nettitude In Password Security Story

Nettitude Educates E-Crime Congress Conference

Nettitude Supports Merchant Payments Ecosystem

Nettitude Exhibit At Europe's Biggest PCI Conference

Nettitude Supports CREST and IISP Conference

Nettitude Strengthens Forensic Service Offering

Nettitude's Column In USA Today's Cybersecurity Supplement

Nettitude Supports PCI SSC European Community Meeting

Nettitude Accredited For PCI P2PE Services

Nettitude Supports BruCON Conference

Nettitude Pedal Power Provides Practical Action Against Poverty

Nettitude Achieves ISO 14001 Environmental Standard

Nettitude Awards Excell Diamond Standard

BSides London 2014

Heartbleed – How to respond

Heartbleed Bug

CRESTCon & IISP Congress 2014

Security Awareness Training - Latest Findings

Latest Security Breaches Spark Wake-Up Call For ‘The Board’

Does Conventional Penetration Testing Identify The True Risk?

PCI London – January 2013

Is Defence In Depth Dead?

Security Surrounding ‘Bring Your Own Device’

Martin's Movember Challenge!

Nettitude Hosts New Office Expo

Nettitude Leads Security Industry

Nettitude Helps University Students With Ethical Hacking Lab

Nettitude Moves To New UK Head Office

Nettitude’s Testers Show World-Class Expertise

Cryptography Has Been "Broken"...Or Has It?

Nettitude Has 'Formula 1' For Security!

Nettitude Consultant Praised As Rising Star

Nettitude Makes Big Strides Through Key Appointments

Nettitude Hosts Public Sector PCI Security Seminar

Beyond PCI DSS - Protecting More Than Just Card Data

Nettitude Hosts PCI Security Seminar

PCI Council Releases Version 2.0

Book NOW For PCI Security Seminar!

Nettitude Secures Earls Court IT Deal

Nettitude & Coventry University Team-Up To Fight Cybercrime

Nettitude Achieves ISO 27001 Security Standard

Nettitude Gets Crest Seal Of Approval

Investing In The Future Of Nettitude

Nettitude Achieve Cisco Advanced Unified Communications Certification

About Nettitude

Nettitude is the trusted cyber security provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

In 2018, Nettitude became part of Lloyd’s Register, an 8,000 person strong professional services organisation, with 300 years of heritage in safety and risk management. Nettitude now provides true global coverage, through a network of over 180 offices strategically placed around the globe.

Subscribe Here!

Recent Posts