Go to content

Compliance

From Scan Lists to Security Gains: Why Nanitor’s CTEM Platform Outperforms legacy assessments for NCSC CRA and DSPT Compliance

Gunnsteinn Hall

Gunnsteinn Hall


Chief Product Officer

31.05.25


4 min read

As the Chief Product Officer (CPO) of Nanitor, I’m proud to share how our Continuous Threat Exposure Management (CTEM) platform is uniquely positioned to help organizations not only assess but continuously improve their cybersecurity posture in alignment with the UK’s National Cyber Security Centre (NCSC) Cyber Resilience Assessment (CRA) and the Data Security and Protection Toolkit (DSPT).

Read more
From Scan Lists to Security Gains: Why Nanitor’s CTEM Platform Outperforms legacy assessments for NCSC CRA and DSPT Compliance


  • How CTEM Integrates TEM, CAASM, and Cyber GRC

    Cybersecurity

    How CTEM Integrates TEM, CAASM, and Cyber GRC

    Jon Taylor, Chief Operating Officer


    01.04.25


    5 min read

    The cybersecurity landscape is more complex than ever. Organizations face an overwhelming number of security tools, yet cyber threats continue to escalate. Many businesses rely on disconnected solutions that create security gaps rather than filling them. To combat these challenges, businesses need a framework integrating multiple strategies into a single, continuous process.

    Read more
  • How Nanitor's CTEM Platform Ensures Seamless Compliance with DORA

    Compliance

    How Nanitor's CTEM Platform Ensures Seamless Compliance with DORA

    Chris Ayliffe, Chief Marketing Officer


    14.08.24


    3 min read

    Nanitor's Continuous Threat Exposure Management (CTEM) platform is designed with DORA's requirements at its core. The platform provides a comprehensive solution for financial institutions to manage and mitigate ICT risks, ensuring they meet the compliance criteria set out by DORA.

    Read more
  • How Nanitor Supports NIS2 Compliance

    Compliance

    How Nanitor Supports NIS2 Compliance

    Chris Ayliffe, Chief Marketing Officer


    24.07.24


    3 min read

    The European Union's NIS2 Directive is set to become a cornerstone of cybersecurity standards, particularly for critical infrastructure companies. Officially known as “Directive (EU) 2022/2555 on measures for a high common level of cybersecurity across the Union,” NIS2 replaces the old NIS directive and comes into full effect on October 18, 2024.

    Read more
  • Staying Onside at the Euros: How Nanitor's CTEM Keeps Cyber Threats in Check

    Cybersecurity

    Staying Onside at the Euros: How Nanitor's CTEM Keeps Cyber Threats in Check

    Chris Ayliffe, Chief Marketing Officer


    12.07.24


    3 min read

    Imagine the excitement of the Euro 2024 football tournament. England, known for their cautious yet effective gameplay, has made it to the final. Throughout the tournament, their strategy has been one of vigilance, adaptability, and continuous improvement.

    Read more
  • Leveraging Nanitor's CTEM Platform to Mitigate the Risk of Cyber Attacks

    Cyber Exposure Alerts

    Leveraging Nanitor's CTEM Platform to Mitigate the Risk of Cyber Attacks

    Chris Ayliffe, Chief Marketing Officer


    12.07.24


    3 min read

    Ticketmaster's recent data breach has sent shockwaves across North America, with emails urging customers to safeguard against identity theft and fraud. The breach, which took place in May, saw the personal details of 560 million customers stolen by cyber criminals.

    Read more
  • Strengthening Your Cyber Defenses: Nanitor's Guide to Ransomware Protection

    Cybersecurity

    Strengthening Your Cyber Defenses: Nanitor's Guide to Ransomware Protection

    Jon Taylor, Chief Operating Officer


    03.07.24


    3 min read

    At Nanitor, we know that having a solid cybersecurity program is crucial for keeping your systems and data safe from cyberattacks, especially ransomware. These attacks are becoming more frequent and complex, posing serious risks to businesses and institutions worldwide.

    Read more
  • Understanding the Difference Between CTEM and ASM: Enhancing Cybersecurity and Hygiene with Nanitor

    Cybersecurity

    Understanding the Difference Between CTEM and ASM: Enhancing Cybersecurity and Hygiene with Nanitor

    Jon Taylor, Chief Operating Officer


    26.06.24


    4 min read

    In the ever-evolving landscape of cybersecurity, organizations must adopt robust strategies to protect their digital assets and maintain a strong security posture. Two key approaches in this endeavor are Continuous Threat Exposure Management (CTEM) and Attack Surface Management (ASM).

    Read more
  • Safeguarding Iceland's Digital Horizon: The Urgent Call for Proactive Cybersecurity

    Cyber Exposure Alerts

    Safeguarding Iceland's Digital Horizon: The Urgent Call for Proactive Cybersecurity

    Chris Ayliffe, Chief Marketing Officer


    25.06.24


    3 min read

    As Iceland grapples with an alarming rise in cyber attacks targeting various sectors from media to academia, the urgency for advanced cybersecurity measures has never been more apparent.

    Read more
  • Why You Need Agent-Based Scanning for CTEM

    Exposure Management

    Why You Need Agent-Based Scanning for CTEM

    Chris Ayliffe, Chief Marketing Officer


    03.06.24


    3 min read

    In today's digital landscape, cyber threats are more sophisticated and persistent than ever before. As organizations strive to protect their digital assets, Continuous Threat Exposure Management (CTEM) has become an essential practice. One key element that significantly enhances CTEM is agent-based scanning.

    Read more
  • What Could Happen If You Don't Leverage CTEM

    Exposure Management

    What Could Happen If You Don't Leverage CTEM

    Chris Ayliffe, Chief Marketing Officer


    29.05.24


    3 min read

    In today's rapidly evolving digital landscape, the need for robust cybersecurity measures is more critical than ever. Continuous Threat Exposure Management (CTEM) is emerging as a revolutionary approach to enterprise security, far surpassing traditional vulnerability management.

    Read more
  • Leveraging Nanitor's Global-Leading CTEM Platform: A Comprehensive Guide for Customers and Partners

    MSSP

    Leveraging Nanitor's Global-Leading CTEM Platform: A Comprehensive Guide for Customers and Partners

    Chris Ayliffe, Chief Marketing Officer


    23.05.24


    7 min read

    In the rapidly evolving landscape of cybersecurity, organizations face an ever-growing array of threats and vulnerabilities. To combat these challenges effectively, businesses require robust, comprehensive solutions that not only identify risks but also provide actionable insights to mitigate them.

    Read more
  • What is the CTEM Opportunity For MSSPs?

    MSSP

    What is the CTEM Opportunity For MSSPs?

    Chris Ayliffe, Chief Marketing Officer


    15.05.24


    6 min read

    As cyber threats continue to evolve with increasing complexity and frequency, organizations are under significant pressure to maintain robust defenses. This has given rise to Continuous Threat Exposure Management (CTEM), a methodology that is becoming essential for organizations striving to stay ahead of threats.

    Read more
  • Nanitor: Revolutionizing MSSP Operations with Comprehensive Security Solutions

    MSSP

    Nanitor: Revolutionizing MSSP Operations with Comprehensive Security Solutions

    Chris Ayliffe, Chief Marketing Officer


    14.05.24


    8 min read

    In the rapidly evolving landscape of cybersecurity, Managed Service and Security Providers (MSSPs) are increasingly vital to the security architectures of diverse organizations worldwide. However, the complexity of managing numerous security solutions across multiple clients presents significant challenges that can compromise the effectiveness of MSSPs.

    Read more
  • Exposure Management 101: Misconfigurations

    Exposure Management

    Exposure Management 101: Misconfigurations

    Derek Melber, Chief Strategist


    16.02.24


    4 min read

    Nearly every operating system, database, storage environment, printer, etc. has some form of configuration that needs to be made. In many cases, the configurations are related to security, to ensure the device or environment is secured from an attack.

    Read more
  • Exposure Management 101: Identity Security

    Exposure Management

    Exposure Management 101: Identity Security

    Derek Melber, Chief Strategist


    16.02.24


    4 min read

    Identity security is a major pillar for any security angle, especially for exposure management. Attackers target identities so they can move laterally and obtain privileges throughout the organization. At the core of every identity are properties and attributes, which can be exploited by attackers, with ease in many cases.

    Read more
  • Exposure Management 101: Patch Intelligence

    Exposure Management

    Exposure Management 101: Patch Intelligence

    Derek Melber, Chief Strategist


    16.02.24


    4 min read

    Patch intelligence is often one of the most dodged activities for most organizations. Patching has taught us over the years that often the patch might break things worse than the original issue. However, without patching our systems are exposed to a myriad of exploits and attack paths.

    Read more
  • Exposure Management 101: Vulnerability Management

    Exposure Management

    Exposure Management 101: Vulnerability Management

    Derek Melber, Chief Strategist


    16.02.24


    4 min read

    Vulnerability management is not a new concept. It might be one of the oldest security concepts for organizations, to be honest. However, vulnerability management might be one of the most misunderstood areas of security for most organizations due to the overwhelming number of vulnerabilities that all organizations face.

    Read more
  • Exposure Management: You can’t secure what you don’t know about

    Exposure Management

    Exposure Management: You can’t secure what you don’t know about

    Derek Melber, Chief Strategist


    26.01.24


    4 min read

    It is not a new concept that IT is not fully aware of all of the assets and devices that are on the network. Projects come and go, rogue devices are put on the network, legacy assets are forgotten about, etc. The other concept that is not new is that attackers love these assets and devices that have been orphaned and forgotten. These assets and devices are not updated, patched, configured, secured, or monitored.

    Read more
  • Release Notes 4.7.0

    Cybersecurity

    Release Notes 4.7.0

    Gunnsteinn Hall, Chief Product Officer


    23.01.24


    4 min read

    We're pleased to announce the release of Nanitor v4.7.0, which brings significant enhancements and new features, focusing on streamlining project management, enhancing compliance support, and improving software inventory management.

    Read more
  • CTEM Needs to Include Identity Security

    Exposure Management

    CTEM Needs to Include Identity Security

    Derek Melber, Chief Strategist


    19.01.24


    3 min read

    Continuous Threat Exposure Management (CTEM) is a trending technology that was initially created by Gartner. It is so important that Gartner named it the #2 strategic technology trend for 2024. Gartner also stated that:  “By 2026, organizations that prioritize their security investments based on a continuous exposure management program will be 3x less likely to suffer a breach.”  

    Read more
  • Security Drift – How Do You Know?

    Cybersecurity

    Security Drift – How Do You Know?

    Derek Melber, Chief Strategist


    19.01.24


    4 min read

    Drift Happens! No matter the size of the organization or security staff, nor the monitoring of changes to every device, drift is going to occur. Do you know when everyone on your team makes a change, installs software, tweaks a service on every asset? What if someone installs 5 different software solutions on an asset…

    Read more
  • Is Vulnerability Management Enough to Prevent Ransomware?

    Vulnerability Management

    Is Vulnerability Management Enough to Prevent Ransomware?

    Derek Melber, Chief Strategist


    03.01.24


    4 min read

    Ransomware has proven to be the number one issue for organizations of all sizes and verticals in the past few years. Nearly all of the organizations that have been breached and ransomed had a vulnerability management solution or process in place. So, it begs the question whether or not vulnerability management along is enough?

    Read more
  • Leveraging Industry Standards for Security Hygiene

    Cybersecurity

    Leveraging Industry Standards for Security Hygiene

    Derek Melber, Chief Strategist


    03.01.24


    3 min read

    Often, I see security solutions that are just “guessing” at what needs to be secured. Sure, there is knowledge, experience, and expertise behind the solution. However, when industry standards can be incorporated, it proves that the security solution is considering the massive expertise and analysis that has gone behind the security standardization and recommendations.  

    Read more
  • Nanitor Enhances Protection with External Attack Surface Management (EASM)

    Cybersecurity

    Nanitor Enhances Protection with External Attack Surface Management (EASM)

    Gunnsteinn Hall, Chief Product Officer


    02.01.24


    5 min read

    In the ever-evolving landscape of cybersecurity threats, organizations are constantly seeking ways to fortify their defenses and safeguard their digital assets. Recognizing the importance of proactive security measures, Nanitor has taken a significant leap forward by integrating External Attack Surface Management (EAAS) into its CTEM solution – and the best part? It comes at no extra charge to users.

    Read more
  • Adopting CTEM to Replace Your Legacy Vulnerability Management Solution

    Exposure Management

    Adopting CTEM to Replace Your Legacy Vulnerability Management Solution

    Derek Melber, Chief Strategist


    22.12.23


    7 min read

    Continuous Threat Exposure Management (CTEM), a category that was designated by Gartner, is trending to be one of the hottest topics in 2023. Gartner has stated that CTEM is designed to secure digital and physical assets for any sized organization. Gartner states “By 2026, organizations that prioritize their security investments based on a continuous exposure management program will be 3x less likely to suffer a breach.”

    Read more
  • Adopting CTEM to Replace Your Legacy Vulnerability Management Solution

    Vulnerability Management

    Adopting CTEM to Replace Your Legacy Vulnerability Management Solution

    Derek Melber, Chief Strategist


    22.12.23


    7 min read

    Continuous Threat Exposure Management (CTEM), a category that was designated by Gartner, is trending to be one of the hottest topics in 2023. Gartner has stated that CTEM is designed to secure digital and physical assets for any sized organization. Gartner states “By 2026, organizations that prioritize their security investments based on a continuous exposure management program will be 3x less likely to suffer a breach.”

    Read more
  • How to Implement Continuous Threat Exposure Management (CTEM)

    Cybersecurity

    How to Implement Continuous Threat Exposure Management (CTEM)

    Chris Ayliffe, Chief Marketing Officer


    28.11.23


    6 min read

    In the realm of cybersecurity evolution, Continuous Threat Exposure Management (CTEM) emerges as a transformative approach, surpassing traditional vulnerability management. Developed by Gartner, CTEM's proactive security posture remediation plan navigates five core stages: scoping, discovery, prioritization, validation, and mobilization, ensuring adaptability in the face of evolving cyber threats.

    Read more
  • Meet Heimir Gunnlaugsson: Empowering Nanitor's Journey into Cybersecurity Excellence

    Cybersecurity

    Meet Heimir Gunnlaugsson: Empowering Nanitor's Journey into Cybersecurity Excellence

    Heimir Fannar Gunnlaugsson, Chief Executive Officer


    27.11.23


    3 min read

    Dive into the world of cybersecurity leadership with Heimir Gunnlaugsson, Nanitor's seasoned CEO. Drawing from a wealth of experience in industry giants like Microsoft, Heimir delves into Nanitor's mission, the strategic importance of partnerships, and the critical role of Continuous Threat Exposure Management (CTEM) in fortifying cybersecurity defenses. Explore Heimir's serious vision for Nanitor's future, highlighting the profound impact it seeks to make in elevating digital security to new heights.

    Read more
  • The Key Differences Between CTEM and Vulnerability Management

    Exposure Management

    The Key Differences Between CTEM and Vulnerability Management

    Chris Ayliffe, Chief Marketing Officer


    20.11.23


    6 min read

    In the rapidly evolving landscape of digital transformation, businesses grapple with escalating cybersecurity risks, prompting a departure from traditional Vulnerability Management to the more dynamic Continuous Threat Exposure Management (CTEM). The traditional approach of Vulnerability Management, centered on identifying and remediating known vulnerabilities, falls short in the face of today's complex IT environments. Manual remediation planning and passive identification lead to inaccurate risk assessments, necessitating a shift to a more robust and adaptive cybersecurity strategy.

    Read more
  • The Key Differences Between CTEM and Vulnerability Management

    Vulnerability Management

    The Key Differences Between CTEM and Vulnerability Management

    Chris Ayliffe, Chief Marketing Officer


    20.11.23


    6 min read

    In the rapidly evolving landscape of digital transformation, businesses grapple with escalating cybersecurity risks, prompting a departure from traditional Vulnerability Management to the more dynamic Continuous Threat Exposure Management (CTEM). The traditional approach of Vulnerability Management, centered on identifying and remediating known vulnerabilities, falls short in the face of today's complex IT environments. Manual remediation planning and passive identification lead to inaccurate risk assessments, necessitating a shift to a more robust and adaptive cybersecurity strategy.

    Read more
  • Exploring Continuous Threat Exposure Management (CTEM)

    Cybersecurity

    Exploring Continuous Threat Exposure Management (CTEM)

    Derek Melber, Chief Strategist


    09.11.23


    9 min read

    Continuous threat exposure management (CTEM) is a new and expansive view of enterprise security. The legacy vulnerability management solutions and approach is still valid, just not comprehensive enough to truly protect an enterprise. With enterprises under attack from internal and external threat actors, every advantage the organization can gain to secure every avenue the threat actor might act upon could mean the difference between being breached and subverting the attack.

    Read more
  • Exploring Continuous Threat Exposure Management (CTEM)?

    Exposure Management

    Exploring Continuous Threat Exposure Management (CTEM)?

    Derek Melber, Chief Strategist


    09.11.23


    9 min read

    Continuous threat exposure management (CTEM) is a new and expansive view of enterprise security. The legacy vulnerability management solutions and approach is still valid, just not comprehensive enough to truly protect an enterprise. With enterprises under attack from internal and external threat actors, every advantage the organization can gain to secure every avenue the threat actor might act upon could mean the difference between being breached and subverting the attack.

    Read more
  • What is Clone Phishing?

    Cybersecurity

    What is Clone Phishing?

    Chris Ayliffe, Chief Marketing Officer


    12.07.23


    8 min read

    Clone phishing is an evolving and increasingly sophisticated form of cyber attack that involves the criminal cloning a legitimate email or any other type of online communication sent by an organisation. By replicating the original message, a scammer can attempt to mislead recipients into opening malicious links, downloading compromised files, or divulging confidential information. This deceptive practice has become more common in recent years as technological advances have enabled attackers to easily craft imitation emails with convincing accuracy and bypass standard spam filters.

    Read more
  • What is Secrets Management?

    Cybersecurity

    What is Secrets Management?

    Chris Ayliffe, Chief Marketing Officer


    11.07.23


    8 min read

    Secrets management has become a critical element of any modern business’s cybersecurity strategy. As hacking techniques continue to evolve, secrets management is essential to help protect against the theft or misuse of your company's confidential information and ensure that only the right people have access to it. But what exactly is secrets management?

    Read more
  • What is Configuration Management?

    Cybersecurity

    What is Configuration Management?

    Chris Ayliffe, Chief Marketing Officer


    11.07.23


    8 min read

    Configuration management is an integral part of cyber security for businesses and organisations. It helps protect critical business systems and data from digital threats, ensuring safe production environment operations, the integrity of sensitive customer information, and compliance with industry regulations.

    Read more
  • What is Malware Analysis?

    Cybersecurity

    What is Malware Analysis?

    Chris Ayliffe, Chief Marketing Officer


    06.07.23


    8 min read

    Malware analysis has come into focus as a major cybersecurity concern in recent years. As more and more business transactions are conducted online, malicious entities have become increasingly savvy in the methods they use to exploit vulnerable systems and steal valuable data, making malware an ever-present threat.

    Read more
  • What is Remediation in Cybersecurity?

    Cybersecurity

    What is Remediation in Cybersecurity?

    Chris Ayliffe, Chief Marketing Officer


    26.06.23


    8 min read

    In today's digitally-driven world, cybersecurity has become increasingly vital. As technology rapidly evolves and permeates every aspect of our daily lives, cyber threats seeking to exploit these advancements also multiply. Maintaining robust cybersecurity measures is a crucial component of any organisation's security strategy, playing a pivotal role in safeguarding businesses from hackers, viruses, malware, ransomware, and other potential dangers. This process involves identifying vulnerabilities within systems and addressing them to reduce the likelihood of breaches or attacks.

    Read more
  • Everything You Need to Know About CAASM

    Cybersecurity

    Everything You Need to Know About CAASM

    Chris Ayliffe, Chief Marketing Officer


    05.06.23


    8 min read

    On April 30, 1993 the internet went public and completely changed the world forever. The concept of the internet was the idea of Tim Berners-Lee, who at the time was a 37-year-old researcher at the CERN institute in Switzerland. Tim’s concept was of an interconnected world where information was available to anyone at any time.

    Read more
  • Why is Vulnerability Management Important?

    Vulnerability Management

    Why is Vulnerability Management Important?

    Chris Ayliffe, Chief Marketing Officer


    05.06.23


    8 min read

    In the digital age, cyber security is more important than ever. As technology continues to advance and become an integral part of our daily lives, so do the threats that seek to exploit it. Staying on top of cybersecurity is an essential part of any organisation’s security plan and plays a key role in protecting your business from hackers, viruses, malware, ransomware and other threats. It helps to identify weaknesses within systems as well as patching them up to minimise the risk of a breach or attack.

    Read more
  • What is Software Asset Management (SAM)?

    Cybersecurity

    What is Software Asset Management (SAM)?

    Chris Ayliffe, Chief Marketing Officer


    31.05.23


    8 min read

    Software asset management (SAM) is an IT process for tracking and managing software licenses, installations, versions, and usage. SAM ensures that a business only invests in the software it needs while avoiding issues with compliance and security. It involves keeping track of all software products used within an organization; their quantity, cost, license terms, and usage to ensure they are not over or under-utilized.

    Read more
  • How to Prevent Network Downtime

    Cybersecurity

    How to Prevent Network Downtime

    Chris Ayliffe, Chief Marketing Officer


    04.05.23


    10 min read

    It goes without saying that every business relies heavily on its network connection. In fact, it’s believed that almost 97% of businesses in the world cannot operate without a connection to the web. Without one, not only do you run the risk of disruption to everyday operations, but there can also be financial repercussions if customers and clients are unable to access services or products due to a slowed-down or non-functioning network.

    Read more
  • How to Automate Vulnerability Management

    Vulnerability Management

    How to Automate Vulnerability Management

    Chris Ayliffe, Chief Marketing Officer


    04.05.23


    10 min read

    Maintaining your business’s cyber security has become an essential part of running a successful organisation. With the increase in data breaches and hackers, protecting yourself against threats is more important than ever. One reliable way to streamline this process and keep your business safe online is by automating vulnerability management using specialised tools and software. But what exactly does that mean? Below, we're going to explain everything you need to know about automated vulnerability management so you can protect yourself against potential threats without taking too much valuable time away from other aspects of running your business.

    Read more
  • How to Implement ISO 27001

    Cybersecurity

    How to Implement ISO 27001

    Chris Ayliffe, Chief Marketing Officer


    12.04.23


    9 min read

    Everyone knows that cybersecurity is a crucial component of ensuring the safety and protection of your business, its data, and its customers. Unfortunately, not everyone has the level of understanding necessary to build an effective cybersecurity strategy. There are many different ways a business or individual can improve the strength of their online security and figuring out the best place to start can be overwhelming, confusing or downright terrifying, but it doesn’t have to be.

    Read more
  • What You Need to Know About the Vulnerability Management Lifecycle

    Vulnerability Management

    What You Need to Know About the Vulnerability Management Lifecycle

    Chris Ayliffe, Chief Marketing Officer


    04.04.23


    9 min read

    It’s very easy to become overwhelmed when thinking about cybersecurity. It seems like there’s some sort of virus, bug or scam lurking almost everywhere these days. It’s true that the threats to cyber security that businesses and even the general public face every single day have never been higher, but you might not need to stress as much as you think because the methods of dealing with these kinds of problems have also evolved and become more sophisticated.

    Read more
  • How Should Companies Handle Ransomware?

    Cybersecurity

    How Should Companies Handle Ransomware?

    Chris Ayliffe, Chief Marketing Officer


    03.03.23


    9 min read

    Read more
  • What is a Vulnerability Management Program?

    Vulnerability Management

    What is a Vulnerability Management Program?

    Chris Ayliffe, Chief Marketing Officer


    03.03.23


    9 min read

    In an interconnected world it’s incredibly important to be aware of cybersecurity. Hackers and scammers are becoming an increasingly pertinent problem for any business that has an online presence or uses connected software. Globally, more than 30,000 websites are attacked by hackers or malware every day. This figure means that more than 64% of businesses in the world have experienced some sort of cyber attack in the last year alone. 

    Read more
  • Log4Shell worst-case scenario

    Cyber Exposure Alerts

    Log4Shell worst-case scenario

    Jon Taylor, Chief Operating Officer


    22.12.22


    4 min read

    Log4Shell, prepare for anything!

    Read more
  • Log4j / Log4Shell

    Cyber Exposure Alerts

    Log4j / Log4Shell

    Jóhann Páll Kulp, CISO, Chief Security Officer


    15.12.21


    3 min read

    Nanitor is not affected by the Log4j vulnerability.

    Read more
  • How does Nanitor support your cybersecurity strategy

    Cybersecurity

    How does Nanitor support your cybersecurity strategy

    Alfred Hall, Chief Technical Officer


    21.07.21


    4 min read

    To enforce an effective cybersecurity policy, company executives need a crisp and concise view of their cybersecurity landscape. An incomplete view of cybersecurity issues results in the inability of the executives to adequately support their IT Ops / SecOps teams who are tasked with enforcing your cybersecurity technical policy and regulatory compliance. Without visibility, your cybersecurity strategy is at risk.​

    Read more
  • Proper Use of Administrative Privileges for System Administrators in Windows Domains

    CybersecurityWindows

    Proper Use of Administrative Privileges for System Administrators in Windows Domains

    Alfred Hall, Chief Technical Officer


    19.05.21


    5 min read

    The short story is: For a compromised computer, we can essentially assume that an attacker can steal password credentials and hashes which is sufficient to remotely control other machines (pass the hash weakness in Windows). Thus for example, if a Domain Admin logs into a compromised conference computer, the attacker can easily collect the password hash and use to access any other computer on the network, including other computers.

    Read more
  • Get cybersecurity of your Oracle databases under control with Nanitor

    Cybersecurity

    Get cybersecurity of your Oracle databases under control with Nanitor

    Alfred Hall, Chief Technical Officer


    20.04.21


    2 min read

    Oracle databases like most other things come out of the box with default configuration, for example there are default passwords in place and sample users and databases if you have not be super careful in the installation process.

    Read more