Nettitude Blog

Nettitude’s Q1 2019 PERCEPTION Report: What are the latest threats facing the financial sector?

Posted by Nettitude on Apr 4, 2019 5:42:15 PM

We just released our latest edition of PERCEPTION, our cyber threat intelligence briefing for the financial services sector edited by Dr Graham Shaw. This contains informative, relevant and timely information about the cyber threat landscape for financial institutions, current threat actors and recent activities, and is designed to help you address the cyber risks faced by your organization.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area

Developing a Cyber Security Strategy: How do you plan for the inevitable?

Posted by Nettitude on Apr 4, 2019 3:30:29 PM

 Cyber-attacks and the impact they have on organizations are becoming much better understood. However, in facing increasingly sophisticated, targeted and untargeted attacks, the complexity and scale of the threat means that avoiding a cyber-attack is becoming harder for organizations. If a cyber-attack is going to happen at some point, it’s essential that organizations plan for, and prepare to respond to, the inevitable. But this can be easier said than done. What steps do organizations need to take to develop a cyber security strategy that ensures they are prepared?

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog, Download Area

Ransomware: Where are we now?

Posted by Nettitude on Mar 25, 2019 9:07:07 PM

By Michael Fratello, Security Consultant at Nettitude

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation

How to Monitor Your External Devices and Improve Your Alerts (pt.2)

Posted by Graham Sharples on Aug 29, 2017 4:41:52 PM

Earlier this week we published the first half of this blog. The preceeding blog can be found here: http://blog.nettitude.com/how-to-monitor-your-external-devices-and-improve-your-alerts-pt.1

Read More

Topics: Cyber Security Blog

How to monitor your external devices and improve your alerts (pt.1)

Posted by Graham Sharples on Aug 14, 2017 8:30:00 AM

Being able to detect new malware infections or security breaches on a network or on a computer system without known signatures is always a challenge. We explore a simple and efficient solution to monitor external facing assets, such as servers, and we discuss the data that was collected during the experimental period.

Read More

Topics: Cyber Security Blog

5 Steps to Cyber Defense Post PCI DSS

Posted by Shai Canaan on Mar 9, 2017 10:21:26 AM

 

PCI DSS and I

Your company obtained PCI compliance. It could have been a journey which ended with a QSA audit, a self-assessment; or, as I saw in some cases, forsaken the PCI crown and decided to “eat” the risk.

So, What now?

Small and large organizations with PCI obligations have more than a Cardholder Data Environment (CDE) to worry about. There are always cyber security concerns involving systems availability, reputation, and also sensitive data concerns around Personally Identifiable Information (PII), healthcare related data, Intellectual Property (IP), regulatory requirements etc.

Read More

Topics: Uncategorized, Cyber Security Blog

A recap of RSA 2017

Posted by Media marketing on Mar 7, 2017 1:05:08 PM

 

A recap of RSA 2017

In my blog piece in January, An advance look at RSA 2017, I wrote of what attendees could expect in advance of the RSA 2017 conference to ensure they made the most of their time there.

I wrote of the importance of wearing comfortable shoes, as there’s a lot of walking at RSA. With events in the south, north and west Moscone Center buildings and also two blocks away at the Marriott Marquis, combined with the long expo floor aisles; I am surprised podiatrists didn’t set up shop outside the convention center.

Like everyone, I left the conference with extreme information overload, sore feet, and much more educated about the current and future states of information security.

Read More

Topics: Uncategorized, Cyber Security Blog

An advance look at RSA 2017

Posted by Media marketing on Jan 17, 2017 5:24:20 PM

By Ben Rothke, CISSP PCI QSA

The RSA conference is about a month away and I am already looking forward to it. As the largest and one of the most influential information security conferences, it has turned into the go-to event of the information security season. Pretty much every player, big and small, in the information security world will be there.

RSA has long been the conference to get up to date information from security practitioners about current issues and threats. Now that the agenda for 2017 is available, four of the key topics for this year’s conference are on:

Read More

Topics: Uncategorized, Cyber Security Blog

For Health And Glory: "Hacker Ergonomics"

Posted by Zhen He on Jan 13, 2016 2:00:19 PM

Hacker Ergonomics

Read More

Topics: Uncategorized, Cyber Security Blog

A Guide to Starting the PCI DSS Process

Posted by Jim Seaman on Nov 24, 2015 3:51:04 PM

Okay, so I am a merchant who has just received notification from my acquiring bank that I need to provide them with my compliance state for the Payment Card Data Security Standard (PCI DSS). Where do I start? My bank has pointed me to the Payment Card Industry Security Standards Committee (PCI SSC) website.

Read More

Topics: Uncategorized, Cyber Security Blog

About Nettitude

Nettitude is the trusted cyber security provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

Our experts use an award winning Threat Intelligence led approach that incorporates real-time data, ensuring that your company is protected at every stage of its journey.

Receive an update when we post!

Recent Posts