Nettitude Blog

Reducing dwell time for attackers, once they're in your network

Posted by Rowland Johnson on Nov 10, 2017 4:03:46 PM

Many organizations will be familiar with the Verizon Data Breach Investigations Report, (DBIR) that is issued each year. A reoccurring theme within the report each year is to record the average amount of time it takes an organization to identify an attack, (or data breach) from the initial point that the intruder gained access to the network. This is often referred to as the dwell time.

The initial time that it takes to compromise an asset is usually managed in seconds. For spear phishing, this effectively suggests that a user will either decide to click or not click a link in an e-mail within a few seconds of reading it.

The amount of time it typically takes for data to be exfiltrated after an initial incident is measured in days. This means that after the initial compromise, an attacker will be resident within the network for a number of days before attempting to exfiltrate data.

Read More

SOC maturity - Setting standards for your SOC

Posted by Rowland Johnson on Nov 9, 2017 3:28:31 PM

Every organization that either builds a security operations center or subscribes to the services of a managed security services provider (MSSP) hopes that the SOC is able to prevent, detect and respond to cyber related attacks. However, there is huge amounts of variability in SOC services, and it is very common for organizations to build or leverage SOC services that are mismatched to the threats that they face.

Read More

5 things that every CISO should do to mitigate a data breach

Posted by Rowland Johnson on Nov 9, 2017 1:40:46 PM

A cyber breach is probably one of the most disturbing events that a CISO could encounter. Nettitude has worked with many organizations that have experienced cyber incidents, and provides consulting guidance to organizations to mitigate the threat from cybercrime. Here are our top five things that successful CISOs do to mitigate against the risk of a cyber breach.

Read More

5 reasons why organizations can't detect a cyber breach

Posted by Rowland Johnson on Nov 8, 2017 10:49:15 AM

We frequently get contacted by organizations after they have experienced a data breach.  All too frequently the incident comes as a complete shock, and the reason that they find out it because they are contacted by a 3rd party.  We have compiled our top 5 reasons why organizations don’t detect a cyber breach.

Read More

Is penetration testing fit for purpose?

Posted by Rowland Johnson on Nov 6, 2017 3:00:25 PM

This may seem like a strange article for Nettitude to publish, on the basis that we are an award winning cyber security company focusing on penetration testing. We absolutely believe that penetration testing does have value when implemented and oriented properly. However, we frequently see organizations that have been executing penetration testing programs that have really missed this mark. This article discusses the top five failings of pen testing programs we have seen executed across industry.

Read More

Red teaming and blue teaming is shaping detection and response

Posted by Rowland Johnson on Nov 3, 2017 2:58:35 PM

For far too long, penetration testing has been focused on delivering assurance on organizations defensive capabilities. Organizations have initiated penetration testing exercises against internal and external network segments, against applications and databases, and in almost all instances the focus has been to identify vulnerabilities in defenses that can be exploited. Pen testers would assess the firewall build and identify weaknesses in its configuration. They would also assess web applications and identify vulnerable code and configuration. Pen testers assess databases, network shares and other security devices in the hope of identifying vulnerabilities that could be leveraged by an attacker.

Read More

Why the evolution of penetration testing matters for you

Posted by Rowland Johnson on Nov 2, 2017 2:18:42 PM

The cyber landscape is maturing at a startling velocity. An industry that barely existed 20 years ago is now projected to be worth $170 billion by 2020. As the amount of technical development has snowballed, so the need for security assurance has become a board level consideration. Assurance practices have had to evolve to remain in touch with the digital transformation that is occurring around us. Assurance has had to develop to reflect both the changes in the ways we engage with technology, whilst also staying abreast of the evolving threat landscape. Organizations that remain static in their assurance process will become increasingly vulnerable.  For organizations to build effective risk management processes, they must become agile, threat lead, and focus on people, process and technology collectively.

Read More

5 things your current pen testing provider doesn't do

Posted by Rowland Johnson on Oct 30, 2017 11:55:11 AM

Penetration testing is nothing new to the cyber security world.  For many years, organizations have been going out and testing their web applications, assessing their internal networks, and identifying vulnerabilities in their mobile apps. Penetration testing companies have been delivering assurance about the security posture of defensive controls providing guidance on whether the firewall rulebase needs to be updated, if the patching policy is effective, or whether the application code that powers your web infrastructure is free from vulnerability.

Read More

The cloud problem: How devastating can future breaches be?

Posted by Tim Winyard on Oct 18, 2017 4:00:00 PM

As businesses face large cyber breaches with increasing regularity should we be gearing up for an ultimate breach? Is it really possible for someone to get inside the underlying infrastructure of major cloud providers such as Amazon AWS or Azure and start exfiltrating data out of their storage arrays?

Read More

Security awareness in the workplace

Posted by Jules Pagna Disso on Oct 17, 2017 1:07:08 PM

Keeping your business safe from cybercrime doesn’t just revolve around installing the latest anti-virus software, a big part of keeping your assets protected comes down to your employees, making sure they’re aware and educated.

Here’s our guide to your security awareness training for your business.

Read More

About Nettitude

Nettitude is the trusted cyber security provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

Our experts use an award winning Threat Intelligence led approach that incorporates real-time data, ensuring that your company is protected at every stage of its journey.

Receive an update when we post!

Recent Posts