Nettitude Blog

Evaluating Physical Security Controls with Pen Testing | Nettitude

Posted by Nettitude on Sep 22, 2020 4:45:20 PM

By David Lenehan | Managing Principal Security Consultant at Nettitude

Working on your company’s virtual IT security isn’t the only piece of the Information Security jigsaw puzzle. Whilst the bulk of your technical teams’ efforts should be filling in the centre of the jigsaw with things like firewalls, monitoring, endpoint protection, security testing, and more; an organisation's physical security can often get left behind. Whilst the centre of the puzzle is critical to your overall security infrastructure, if the little things like an unlocked server room or unauthorised access to the building is overlooked, then the whole security operation is jeopardised.

Below, we’ll step into the shoes of one of our expert Penetration Testers to find out his experiences with physical security failures and evaluate what went wrong, as well as what physical security measures need to be implemented in order to ensure a holistic cybersecurity plan is in place.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog, Download Area, SEO Series

An insight into how Artificial Intelligence is used in Penetration Testing | Nettitude

Posted by Nettitude on Sep 18, 2020 5:00:19 PM

By Dai Kennett | Senior AI Researcher at Nettitude

With the digital era being well upon us, today’s state of affairs in the cybersecurity world have grown rather complex, in which there’s no exceptions for those of us who work in pen testing. Whilst traditional penetration testing techniques are still very much relevant to today’s reality, there’s no denying that there are many new tools, techniques and even new responsibilities that make penetration testing on the whole, a mammoth task. In light of this, it is become increasingly difficult for human teams to stay on top of these requirements in an effective way, in which it’s becoming more and more necessary to lean on technological automation in order to support our cybersecurity endeavours.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog, Download Area, SEO Series

Endpoint Protection and Visibility – EPP & EDR | Nettitude

Posted by Nettitude on Sep 10, 2020 5:40:00 PM

By Mike Buckley | Presales Security Consultant at Nettitude

What is an Endpoint

Firstly, what is an endpoint? An endpoint is usually a device which communicates with the network to which it is connected. This can be a myriad of devices including, laptops, mobiles, tablets, servers etc. As the attack vectors vary hugely depending on where we focus, this blog will primarily target the laptop/desktop world. Risks to all endpoints may be similar, but the mitigations are very different.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog, Download Area, risk assessment, SEO Series, endpoint protection, endpoint security, endpoint protection software

Technical Solutions for Data Loss Protection | Nettitude

Posted by Nettitude on Sep 1, 2020 4:32:59 PM

By Mike Buckley | Presales Security Consultant at Nettitude

There are a few important principles that should be keeping a responsible CIO/CISO awake at night. Most certainly, one of those would be the loss or leakage of business-critical data such as customer Personal Identifiable Information (PII) or financial details. One of the primary functions of their role is to recognise this and put into place processes and technical controls to lower the risk of that data being exposed. We only have to look in the media to see numerous examples of data breaches. Threat actors as we now call them have been trying to access data of various kinds stretching back into the 1980s when modems connected everything together. Unfortunately for the CIO/CISOs of today there are compliance frameworks such as GDPR which firmly put the burden of responsibility on their shoulders.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog, Download Area, risk assessment, SEO Series, data protection solutions, data loss protection, data leakage protection

The Clock is Ticking - Data Breach Response Times | Nettitude

Posted by Nettitude on Aug 26, 2020 2:05:06 PM

By Graham Stevens | Incident Response Consultant at Nettitude 

GDPR has been with those of us in Europe since May 2018, and in that time, we have seen a number of eye-watering fines being issued by the Information Commissioner's Office (ICO) here in the UK. This has for the most part been for data breaches and general carelessness with personal data by numerous organisations. In fact between March 2019 and March 2020 the ICO took regulatory action 236 times, with 15 of these resulting in fines for businesses who were in breach of the data protection laws.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Cyber Security Blog, Download Area, SEO Series

The Importance of Pen Testing in Legacy Systems | Nettitude

Posted by Nettitude on Aug 21, 2020 4:49:29 PM

By Kyle Barnes | Penetration Tester at Nettitude 

Penetration Testing is an important tool in any organisations’ security arsenal. There are various types of Pen Testing, ranging from network scans and web application tests to social engineering and red team engagements. One of the most important aspects of Penetration Testing is examining Legacy Systems and legacy software. As older technologies have been available for researchers and cybercriminals to scrutinise for longer periods of time, this is one reason why they often contain more known vulnerabilities. However, the chances are that if the cybersecurity experts know about these vulnerabilities, then there’s a very good chance that the cyber-criminals do too. Legacy Systems, either within an internal network or publicly facing, are often the first targeted and can lead to a devastating attack.

Here’s what you need to know about protecting your Legacy System…

Read More

Topics: Cyber Security, Nettitude, Security Blog, Cyber Security Blog, Download Area

Security Risks & Opportunities of Cloud Technology | Nettitude

Posted by Nettitude on Aug 20, 2020 9:00:00 AM

By Elisa Cassi | Cyber Product and Services Manager at Nettitude

Cloud Technology is set to benefit organisations through a range of unique opportunities in terms of agility, resiliency, economy, enhanced workforce productivity. Whilst the adoption of cloud technology does not necessarily pose an inherent cybersecurity risk over on-premise models, existing problems in the applications being moved are likely to be amplified if key emerging risks and newly discovered attack techniques and vulnerabilities  are not identified and properly managed. This is particularly relevant for certain deployment models, such as “lift and shift” due to the fact that issues that were risk accepted because of security control present in the on premise environment do not necessarily translate to acceptable risks in the cloud environment.

We see that cloud service providers are prioritising efforts and resources to secure their infrastructure platforms and are in fact enabling improved security. In this blog the opportunities coming from cloud adoption are discussed, and in particular the key differentiators of cloud security are outlined.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Cyber Security Blog, Download Area

An Exclusive Insight into the Security Operations Centre Vulnerability Management Programme | Nettitude

Posted by Nettitude on Aug 18, 2020 4:40:58 PM

By Mike Buckley | Pre-Sales Consultant at Nettitude

For some of our clients reading this, you might well be familiar with our Security Operations Centre (SOC). However, for many it can be a bit of a mystery with it sounding like some sort of covert operations lair. Whilst we can tell you that what goes on in our SOC is some very clever and ground-breaking stuff, it’s not quite the scenes from the latest James Bond movies!

So, you’re probably wondering what does actually go on in our Security Operations Centre, and what goes on in our Vulnerability Management Programmes. Below, we’ll give you exclusive access to the ins and outs of our SOC Vulnerability Management activities.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Cyber Security Blog, Download Area

The SOC Visibility Triad – SIEM, EDR & NDR | Nettitude

Posted by Nettitude on Aug 4, 2020 2:45:38 PM

By Chris Oakley | VP of Technical Services for the Americas at Nettitude

 

The importance of detection and response

It is common for organizations seeking to improve their security posture to focus on prevention-based practices. This approach aims to stop threat actors from breaching the organization’s infrastructure, which is an important component to a robust security posture and should continue to be a focus.

In the following post, we'll take a look at the objective of effective security and how the SOC Visibility Triad plays an important part in this.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Cyber Security Blog, Download Area

How to use docker in your penetration testing endeavours | Nettitude

Posted by Nettitude on Jul 31, 2020 11:05:28 AM

By Kirk Hayes | Senior Security Consultant at Nettitude

 

Docker is a platform that provides you with the capability to create containers which can link any type of software, to include binaries or libraries. In the following post, we’ve sat down with Nettitude’s Kirk Hayes; Senior Security Consult in the US, to pick his brains on his experience using Docker as he gives us an insight into what Docker is and how it can be used in your Pen Testing engagements.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Cyber Security Blog, Download Area

About Nettitude

Nettitude is the trusted cybersecurity provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

In 2018, Nettitude became part of The Lloyd's Register Group, an 8,000 person strong professional services organisation, with 300 years of heritage in safety and risk management. Nettitude now provides true global coverage, through a network of over 180 offices strategically placed around the globe.

Subscribe Here!

Recent Posts