LRQA Nettitude Blog

How to Reduce Your Attack Surface - Just How Big Is It? | Nettitude

Posted by Nettitude on Aug 11, 2022

 

Many organisations struggle to quantify the full extent of their threat landscape and attack surface. This is compounded by issues surrounding vulnerability prioritisation, which has become a problem. It causes headaches due to several factors such as cost, disruption, and time. Organisations, therefore, need to start adopting a risk-based approach to influence where effort should be invested to reduce the attack surface and the risk posed to the organisation.

Organisations need to start asking themselves what might happen if an asset were to be compromised: what information does that asset hold and what problems could that cause to the organisation if it was suddenly unavailable (or worse stolen) and in someone else’s hands? This approach helps with the plight of remediation, but it’s not enough.

Read More

Topics: Managed Vulnerability Scanning, Vulnerability Management, Vulnerability Scanning, Managed Security Services, Attack Surface Reduction, Reduced Attack Surface

What are the 3 Types of Vulnerability Scanning? | Nettitude

Posted by Nettitude on Jul 31, 2022

 

If you do not know your risks, how can you be safe? This reality is prompting many businesses to set up regular vulnerability scanning to defend against cybercrime.

A 2021 cybersecurity report by the UK Government states that 39% of UK businesses reported a security breach in the last 12 months. Apparently, 21% lost money, data, or assets. The risk is real and 77% say it is a huge priority for directors.

Cybercrime can be indiscriminate. Whatever size your business is, you need to know how to scan for network, system, and website vulnerabilities that leave you open to attack.

Read More

Topics: Managed Vulnerability Scanning, Vulnerability Management, Vulnerability Scanning, Managed Security Services, Vulnerability Scan Tools, Types of Vulnerability Scanning

What is Vulnerability Management & Scanning? | Nettitude

Posted by Nettitude on Jul 27, 2022

 

In today’s increasingly connected world, it can be challenging to keep on top of your organisation’s cyber-risks. You might have insufficient resources and knowledge to achieve this in-house, yet you appreciate it’s vital to remain one step ahead of cyber-attackers.

Vulnerability management and scanning provide total visibility of your organisation’s risk, helping you react to weaknesses before damage is done.

Read More

Topics: Managed Vulnerability Scanning, Vulnerability Management, Vulnerability Scanning, Managed Security Services

The Difference Between Information & Intelligence | Nettitude

Posted by Nettitude on Jun 30, 2022

 

Information Vs Intelligence

The cybersecurity industry can be awash with various terms, three-letter abbreviations, and jargon which is used incorrectly. This sets the wrong expectations and outcomes.

We are referring to Cyber Threat Intelligence (CTI), Open-Source Intelligence (OSINT), Social Media Intelligence (SOCMINT), Human Intelligence (HUMINT), and Technical Intelligence (TECHINT). All have a common theme running through them: the term intelligence. It is an industry buzzword that is designed to generate intrigue, resonate around boardrooms, and make practitioners of the varying disciplines walk ten feet tall.

There is however an underlying issue with at least three of those disciplines; the data they produce is arguably classed as information rather than intelligence, and commonly they are the terms used to aggregate collection capability rather than a polished end product. There is a clear difference between information and intelligence.

Read More

Topics: Cyber Threat Intelligence, Threat Landscape, Security Threats

Is Your Business Prepared for a Data Breach? | Nettitude

Posted by Nettitude on Jun 15, 2022

 

Imagine you have had a data breach and your only support is Google. That’s an increasingly common story. So, let’s rewind and consider how organisations can get into this situation, highlighting potential oversights that could make a risky situation dire.

Read More

Topics: Data Breach

What Is Cyber Threat Intelligence & How Is It Used? | Nettitude

Posted by Nettitude on Jun 7, 2022

 

What is Cyber Threat Intelligence (CTI) and why should you use it?

There is a common misunderstanding as to what Cyber Threat Intelligence is. Many think it‘s a buzzword or just simply raw outputs from data feeds and dark web monitoring. This couldn’t be further from the truth and isolating its use in this area could result in minimal output and value.

Read More

Topics: Cyber Threat Intelligence, Threat Landscape, Security Threats

File Integrity Monitoring - What It Is & FAQs | Nettitude

Posted by Nettitude on May 30, 2022

 

What is File Integrity Monitoring (FIM)?

File Integrity Monitoring (FIM) is a control or process that compares the current state of operating system and/or application software files against a known baseline to validate the integrity of the files (i.e. looking for inconsistencies).

The integrity verification uses a cryptographic hash function to calculate an initial checksum of a file, which is then compared with a newer calculated checksum of the current state of the same file. In essence, a checksum is a small block of data that is derived from another block of data.

Read More

Topics: fim, file integrity monitoring, PCI DSS

How We Found a Second Critical Microsoft VPN Vulnerability | Nettitude Blog

Posted by Nettitude on May 11, 2022

Too many organisations risk cyberattacks via enabled legacy code they do not need. The warning comes in the wake of Nettitude’s cybersecurity team discovering a second high-risk vulnerability in Microsoft’s VPN protocol.

The vulnerability, called CVE-2022-23270, formed part of Microsoft’s 10th May Patch Tuesday release. Everyone should install it as quickly as possible.

Read More

Topics: Microsoft Bug, Microsoft VPN, Microsoft Vulnerability, Patch Tuesday, Microsoft Patch Tueday

Nettitude discovers critical Microsoft VPN vulnerability resulting in essential patch | Nettitude Blog

Posted by Nettitude on May 10, 2022

The race for connectivity during the COVID-19 pandemic left a trail of cyber risk to mitigate. In doing so, Nettitude’s cybersecurity team uncovered a potentially critical Microsoft vulnerability before it was exploited.

CVE-2022-21972 is a Windows vulnerability hidden in legacy Microsoft VPN code for decades. It risks most Windows server versions since Windows 7.

Thanks to Nettitude, Microsoft released a patch on 10th May 2022. Once installed, you can remove this high-risk vulnerability within your network for good.

Read More

Topics: Microsoft Bug, Microsoft VPN, Microsoft Vulnerability, Patch Tuesday, Microsoft Patch Tueday

Our Guide On OWASP ASVS | Award-Winning Cybersecurity

Posted by Nettitude on Apr 30, 2022

Secure application development previously required several fragmented approaches patchworked together, often in an inconsistent manner. Secure deployment of applications was previously poorly defined, and people or process assessments were not considered.

Then, the Open Web Application Security Project (OWASP) decided to do something about it. They created a single easy to follow standard called the Application Security Verification Standard (ASVS). This has been through multiple iterations, with version 4.0.3 being the most recent.

Read More

Topics: ASVS, OWASP ASVS, Application Security Verification Standard

Subscribe Here!

About LRQA Nettitude

Through our connected portfolio of advanced cybersecurity solutions, LRQA Nettitude helps companies to identify and manage the vulnerabilities and threats that pose a risk to their business, building cybersecurity resilience and underpinning your business strategy with proactive measures.

Recent Posts

Posts by Tag

See all