Nettitude Blog

Nettitude

Recent Posts

How Security Awareness Training Can Reduce the Risk of Insider Threats | Nettitude

Posted by Nettitude on Dec 11, 2020 5:05:55 PM

By Stuart Wright | Global Head of Compliance and Risk

When we think about “insider threats” to our organisations, it’s all too easy for our minds to conjure up clichéd images of elaborate plots from a spy film, where the rookie agent goes undercover to get inside information, and then saves the day with just a few minutes to spare. Or perhaps we think about corporate espionage, where an unscrupulous employee infiltrates a competitor by getting a low-level admin job and creeping around the office late at night stealing valuable data that will give their employer a competitive edge.

The reality of the insider threat is almost always a little less exciting, and certainly less dramatic incidents are far more commonplace than the dramatised examples above.

There’s also a lot we can do to try and protect against these attacks, and in this blog post, we’ll talk about some of the key things you should be considering to help address the insider threat.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog, SEO Series

What is Alarm Fatigue in Cybersecurity? | Nettitude

Posted by Nettitude on Dec 7, 2020 4:54:00 PM

By Dan Ryder | Security Operations Team Lead at Nettitude

Cybersecurity teams often start out purchasing a SIEM solution with high hopes they have the staff, training, capability and organisational resources to get the most out of their new platform.

Unfortunately, in many cases the reality is that an already overstretched security team does not have the time needed to manage a SIEM, investigate alarms, manage rulesets, juggle compliance requirements, and ensure continuous proactive monitoring.  In the short term, the gap can be plugged through vendor professional services. However, this needs to be factored into costs on a rolling basis as the organisations attack surface evolves and is not a viable long-term solution.

One of the main contributors to why these internal deployments fail, have more hidden costs, and take more time than expected to utilise is alarm fatigue. In the following post, we’ll investigate what alarm fatigue is and the possible causes.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog, SEO Series

Evidencing cybersecurity measures in ship architecture | Nettitude

Posted by Nettitude on Dec 3, 2020 5:03:12 PM

By Nettitude

Evidencing cybersecurity measures in ship architecture: How can Lloyd’s Register ShipRight Procedures help?

With cyber attacks increasing by 900% on the maritime industry over the last 3 years, it’s never been so important for this sector to address their cybersecurity landscape. As cyber-attackers develop increasingly sophisticated methods to infiltrate a ships operational technology, we are beginning to see that ship owners must now consider integrating cybersecurity requirements into the technical designs and architecture proposals for new builds and refits from an early stage.

As of January 2021, not only will it be in the interests of ship owners and operators to consult cybersecurity best practice as the foundations of ship development, it will be a requirement by the International Maritime Organisation. In order to keep a vessel ‘in class’, it is now essential for maritime organisations to be able to demonstrate a set of robust cybersecurity controls that are pragmatic, appropriate and relevant to the risks they face. So how can ship owners approach need and requirement?

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog, SEO Series

SOC Alerts - Reducing False Positives & Negatives | Nettitude

Posted by Nettitude on Nov 26, 2020 2:14:19 PM

By Dan Ryder, Jamie Roderick and Simon Robinson |  Nettitude SOC

In an ideal world, every cybersecurity alert received in a SOC would be malicious; displayed with context and enriched so that it would be immediately obvious to an analyst what has occurred, and there would be automation and task orchestration to deal with the threat and self-heal the network. But then, in an ideal world, there probably wouldn’t be any SOC alerts because the security posture of an organisation would make it invulnerable to attack or compromise, and there would be no malicious actors either.

In the following post, we’ll take a look at the absolutely key processes to review, update and assure SOC cyber threat detection, reduce false positives and improve your SOC's capabilities on a continuous basis.
This is delivered by our team of SOC Monitor experts, with over 30 years combined experience across Enterprise Network Security, protecting Critical National Infrastructure and industry leading security monitoring for financial FTSE 250 companies. We'll cover the important questions you need to ask yourself in ensuring your team keep up with Threat Actors, enable your teams situational awareness and empower your SOC across the following areas:

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog, SEO Series

TIBER-EU – Global Regulatory Frameworks Compared | Nettitude

Posted by Nettitude on Nov 25, 2020 4:53:59 PM

By Nettitude

In our previous post in the ‘Global Regulatory Frameworks Compared’ series, we looked at the UK’s financial regulatory framework – CBEST. The CBEST framework which was brought in by BoE and the Financial Conduct Authority (FCA) in 2014 was the first step in a series of more proactive measures to combat the misalignment of cybersecurity standards across the board.


Four years later, TIBER-EU was published by ECB and the EU national central banks and approved by the Governing Council of the ECB. This was driven by the apparent need that other intelligence led assurance programmes have enhanced the resiliency of various financial systems. Consequently, multiple regulators around the world started to explore, creating their own frameworks.


Recognising the challenges of having multiple competing frameworks, the ECB decided to look at building a pan-European framework that could be leveraged across the whole of the Eurozone. Below, we’ll explore the TIBER- EU regulatory framework and analyse how it holds up against its global counterparts.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog

How to Approach the IMO Cyber Requirements | Nettitude

Posted by Nettitude on Nov 23, 2020 10:16:02 AM

By Elisa Cassi | Product Development Manager at Nettitude

Cybersecurity is reaching the top of the agenda for many maritime organisations as IMO’s requirements for integrating cyber risk into onboard safety management systems come into force on the 1st of January 2021. The sector is already familiar with the concept of risk and with the creation of a risk management plan. What is required now is to include the cyber risk in the management plan.

But is this cyber risk real in the sector? We believe that “Yes” is the definitive answer and the IMO requirements will play a role in raising awareness of the online threats faced.

In this blog post, Nettitude provides a short summary of what shipowners and ship managers need to do to satisfy the new requirements and at the same time improve their cybersecurity posture.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog, IMO Campaign

6 Ways to Secure your Website with Pen Testing in 2020 | Nettitude

Posted by Nettitude on Nov 20, 2020 1:43:11 PM

By David Parsons | Security Consultant at Nettitude

With the improvements of vulnerability scanners and the ever-increasing proficiency of software such as WAFs and Intrusion Detection Systems, you may be asking yourself whether Penetration Testing is still a relevant way to ensure the security of your website in 2020. The following article discusses several proactive security considerations you should make when either creating, or maintaining a website and how Penetration Testing can be useful in this process.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog, SEO Series

CBEST – Global Regulatory Frameworks Compared | Nettitude

Posted by Nettitude on Nov 17, 2020 5:11:53 PM

By Nettitude

‘Houston, we have a problem…’

The operational resiliency of the financial services sector is of paramount concern to governments and regulators across the globe. A catalogue of high-profile breaches suggests that board level engagement and awareness of how to prepare and respond to a cyber event is frequently misunderstood or inadequate. Although these boards believe that they are taking steps to combat the cyber threat, their strategies are frequently poorly grounded and misaligned.

To address this, a number of regulator-driven frameworks for assessing financial institutions cyber preparedness, protection, detection and response capabilities has matured, and proliferated across multiple regions around the globe. In this five-part blog series, we’ll outline the main regulatory frameworks for the UK, Europe, Singapore and Hong Kong. In the first post, we’ll take a look at the UK’s regulatory framework – CBEST.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog, SEO Series

Privilege Escalation Vulnerability- Electronic Arts (EA) Origin | Nettitude

Posted by Nettitude on Nov 5, 2020 1:20:22 PM

By Nettitude

Electronic Arts (EA) Origin is an online platform that allows users to purchase and play video games on desktop and mobile platforms.  It’s currently used by millions of gamers around the world.  Earlier this year, we identified a vulnerability affecting the EA Origin Windows client. 

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog, SEO Series

The 3 Phases of an Incident Response Process | Nettitude

Posted by Nettitude on Oct 27, 2020 3:28:58 PM

By Adrian Shaw | Senior Incident Response Consultant at Nettitude

Over recent months, Nettitude have noted a sharp increase in cybersecurity incidents within our client base, alongside the unfolding of the on-going Covid-19 pandemic. One cause seems to be issues caused during the migration to remote working by workforces, in which organisations have been left vulnerable. In any event, it now seems timely to talk about the Incident Response process and how an organisation can mature their Incident Response capability.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog, SEO Series

About Nettitude

Nettitude is the trusted cybersecurity provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

In 2018, Nettitude became part of The Lloyd's Register Group, an 8,000 person strong professional services organisation, with 300 years of heritage in safety and risk management. Nettitude now provides true global coverage, through a network of over 180 offices strategically placed around the globe.

Subscribe Here!

Recent Posts