LRQA Nettitude Blog

The Importance of Pen Testing in Legacy Systems | Nettitude

Posted by Nettitude on Aug 21, 2020 4:49:29 PM

By Kyle Barnes | Penetration Tester at Nettitude 

Penetration Testing is an important tool in any organisations’ security arsenal. There are various types of Pen Testing, ranging from network scans and web application tests to social engineering and red team engagements. One of the most important aspects of Penetration Testing is examining Legacy Systems and legacy software. As older technologies have been available for researchers and cybercriminals to scrutinise for longer periods of time, this is one reason why they often contain more known vulnerabilities. However, the chances are that if the cybersecurity experts know about these vulnerabilities, then there’s a very good chance that the cyber-criminals do too. Legacy Systems, either within an internal network or publicly facing, are often the first targeted and can lead to a devastating attack.

Here’s what you need to know about protecting your Legacy System…

Read More

Topics: Cyber Security, Nettitude, Security Blog, Cyber Security Blog, Download Area

Security Risks & Opportunities of Cloud Technology | Nettitude

Posted by Nettitude on Aug 20, 2020 9:00:00 AM

By Elisa Cassi | Cyber Product and Services Manager at Nettitude

Cloud Technology is set to benefit organisations through a range of unique opportunities in terms of agility, resiliency, economy, enhanced workforce productivity. Whilst the adoption of cloud technology does not necessarily pose an inherent cybersecurity risk over on-premise models, existing problems in the applications being moved are likely to be amplified if key emerging risks and newly discovered attack techniques and vulnerabilities  are not identified and properly managed. This is particularly relevant for certain deployment models, such as “lift and shift” due to the fact that issues that were risk accepted because of security control present in the on premise environment do not necessarily translate to acceptable risks in the cloud environment.

We see that cloud service providers are prioritising efforts and resources to secure their infrastructure platforms and are in fact enabling improved security. In this blog the opportunities coming from cloud adoption are discussed, and in particular the key differentiators of cloud security are outlined.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Cyber Security Blog, Download Area

An Exclusive Insight into the Security Operations Centre Vulnerability Management Programme | Nettitude

Posted by Nettitude on Aug 18, 2020 4:40:58 PM

By Mike Buckley | Pre-Sales Consultant at Nettitude

For some of our clients reading this, you might well be familiar with our Security Operations Centre (SOC). However, for many it can be a bit of a mystery with it sounding like some sort of covert operations lair. Whilst we can tell you that what goes on in our SOC is some very clever and ground-breaking stuff, it’s not quite the scenes from the latest James Bond movies!

So, you’re probably wondering what does actually go on in our Security Operations Centre, and what goes on in our Vulnerability Management Programmes. Below, we’ll give you exclusive access to the ins and outs of our SOC Vulnerability Management activities.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Cyber Security Blog, Download Area

The SOC Visibility Triad – SIEM, EDR & NDR | Nettitude

Posted by Nettitude on Aug 4, 2020 2:45:38 PM

By Chris Oakley | VP of Technical Services for the Americas at Nettitude

 

The importance of detection and response

It is common for organizations seeking to improve their security posture to focus on prevention-based practices. This approach aims to stop threat actors from breaching the organization’s infrastructure, which is an important component of a robust security posture and should continue to be a focus.

In the following post, we'll take a look at the objective of effective security and how the SOC Visibility Triad plays an important part in this.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Cyber Security Blog, Download Area, Security Operations Centre, Gartner SOC Triad, SOC Triad

How to use docker in your penetration testing endeavours | Nettitude

Posted by Nettitude on Jul 31, 2020 11:05:28 AM

By Kirk Hayes | Senior Security Consultant at Nettitude

 

Docker is a platform that provides you with the capability to create containers which can link any type of software, including binaries or libraries. In the following post, we’ve sat down with Nettitude’s Kirk Hayes; Senior Security Consult in the US, to pick his brains on his experience using Docker as he gives us an insight into what Docker is and how it can be used in your Pen Testing engagements.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Cyber Security Blog, Download Area

PCI Compliance – What have we learnt in 2020? | Nettitude

Posted by Nettitude on Jul 29, 2020 10:48:26 AM

By Stuart Wright | Head of Information Security Consulting at Nettitude

We are now over halfway through 2020, and it is fair to say that this has been an unusual year so far for everyone. Like many organisations, Nettitude has had to be agile in how we work, in which we have adapted to a whole new way of delivering consultancy. In addition, many of our clients have had to adapt their processes for how they receive assessments. As a result, we have all become very familiar with new ways of working and whilst this has been challenging to say the least, there is hope that it will create a new resilience in the way be approach challenges moving forwards. So how has the current climate affected PCI compliance? And what’s in store for the rest of 2020?

Below, we’ll take a look at some of the challenges faced around PCI compliance in recent months and reflect on what we’ve learnt, what needs to change, and the approach we’re taking to continue to ensure the effectiveness of our consultancy and assessment procedures.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Cyber Security Blog, Download Area, SEO Series

An Introduction to SOC Monitor Services| Nettitude

Posted by Nettitude on Jul 27, 2020 3:34:20 PM

By Jenny Wu | Senior Incident Response Consultant at Nettitude

In 2019, 12,174 new vulnerabilities[1] were reported to MITRE, and cybersecurity-related attacks are expected to cost over $6 trillion USD in damages globally by 2021[2]. These numbers show that the threats in today’s world are only increasing. Threat actors and their tactics are evolving to be more sophisticated than ever, outwitting static alerts and traditional means of detection.

Organizations are facing increasing pressure from all sides to meet cybersecurity requirements and protect the business: government bodies, compliance organizations, partners, clients, and leadership. In order to manage and successfully mitigate these threats, organizations must be poised to detect them; however, detection requires skilled personnel and smooth processes combined with the appropriate technology to combat these ever-growing and evolving threats. SOC monitoring is an organization’s best ally in detecting these threats.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Cyber Security Blog, Download Area

How to Prepare for the CMMC | Nettitude

Posted by Nettitude on Jul 23, 2020 2:34:13 PM

By Joe Donohue | Senior Information Security Consultant at Nettitude

For many defense suppliers, CMMC is just another headache. COVID19 is already pushing most organizations to their limits. So, being asked to adopt a new set of practices is a tall order, especially for those organizations that recently put in a tremendous effort to meet the requirements of the NIST 800-171 framework. Fortunately, rather than being a massive change in direction, CMMC is actually the next logical step in the DoD’s drive to secure its supply chain. So, with the proper approach, your organization can gracefully meet this new challenge and benefit by becoming more secure and resilient in the process.

Read More

Topics: Cyber Security, Nettitude, Events, Security Blog, Cyber Security Blog, Download Area, CMMC Campaign

The Cost of Malware & its Impact on Business | Nettitude

Posted by Nettitude on Jul 21, 2020 5:03:17 PM

By Jenny Wu | Senior Incident Response Consultant at Nettitude

Malware in today’s world is a fact of life. As technology advances and devices are increasingly connected and evolving, so too are techniques and tools used to exploit this technology. With exploitation and malware rampant, the likelihood of your organization experiencing an attack and paying the price is set to increase.

Cyber-attacks and the damage they cause can be very costly to organizations. The costs of cyber-attacks are not limited to the immediate containment and eradication of threats. Operational costs, loss of revenue from downtime, emergency remediation and recovery solutions can exacerbate costs, not to mention the existence of intangible costs such as reputational loss. But what is the real impact of malware on business, and how can organization reduce its impact?

Read More

Topics: Cyber Security, Nettitude, Events, Security Blog, Cyber Security Blog, Download Area, SEO Series

The Importance of Network Security Consulting | Nettitude

Posted by Nettitude on Jul 17, 2020 2:30:59 PM

By Mike Buckley | Pre-Sales Consultant at Nettitude

In today’s busy environment, it’s becoming very rare for an organisations IT support team to be well resourced, with plenty of time on their hands. Having worked closely with our client’s IT Teams, one of the most frequent issues we hear about which poses a risk to an organisation’s cybersecurity is not having enough time. With cyber-threats constantly evolving, it is essential for IT teams to have time to attend training courses and gain experience on everything they are expected to support.

IT Support teams don’t have an easy job; they have to contend with a multitude of issues across a multitude of different technologies, all the while trying to appease their user base. Alongside other technologies that require in depth specialist knowledge, networks can be a particular challenge for IT teams.

In the following blog post, we’ll take a look at some of the most challenging issues that IT support teams in SME’s face, analyse the importance of making time for essential training and professional development, and examine the role of network security consulting.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Cyber Security Blog, Download Area, SEO Series

Subscribe Here!

About Nettitude

Nettitude is the trusted cybersecurity provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

Recent Posts

Posts by Tag

See all