File Integrity Monitoring Articles
Read articles from industry experts New Net Technologies to find out about best practices in keeping your IT systems secure.
The ways in which File Integrity Monitoring can strengthen your security are threefold – through system hardening, malware protection, and change management. Click on a link below to find out more about how firewalls, servers, databases, servers and anti-virus programs can protect your IT systems.
- Category: File Integrity Monitoring
According to a report from Aberdeen Group, the median dwell time for data breaches between 2014 and 2016 was around 38 days, leaving data breaches undetected for nearly five to six weeks.
- Category: File Integrity Monitoring
Read NNT's CTO Mark Kedgley's latest article discussing the concept of alert fatigue and the need for forensic level, real-time integrity change monitoring, combined with blacklist/whitelist based analysis for breach detection, published with SCMagazine.
- Category: File Integrity Monitoring
Threats to theft of Intellectual Property, financial data, Cardholder Data, PII (Personally Identifiable Information) are more diverse and increasingly difficult to defend against. The traditional ‘internet vandalism’ from viruses is still an issue but the ‘threatscape’ in 2017 is far more diverse and dangerous than ever before.
- Category: File Integrity Monitoring
Has there ever been a more confusion-generating initiative than the PCI DSS? Even now, thirteen years on from its initial introduction, a clear and definitive understanding of what your organization needs to do may still be a challenge.
- Category: File Integrity Monitoring
In order to maintain the integrity of a Windows file system, monitoring is applied to ensure no unauthorized changes are made to files, folders or configuration settings.
- Category: File Integrity Monitoring
It should come as no surprise that the financial industry is the ideal target for lawless cyber thieves, holding a treasure trove of sensitive information and financial credentials of innocent victims.
- Category: File Integrity Monitoring
We were recently asked to contribute to an article being written about "Fraud health checks, and training: what should businesses be doing?" The scope included all fraud, so not just IT fraud, but data theft by employees, material theft, and financial fraud. Our stance is that all fraud is preventable, but in the same way that any football game is winnable – stuff happens, mistakes are made, freak goals are scored. Accepting this means that, while the goal for combatting fraud is 100%, the reality will be that you can't win 'em all.
- Category: File Integrity Monitoring
In part 1 of this series of articles, we talked about the importance of using File Integrity monitoring for system files as a backstop to AV for detecting malware. Enterprise-level FIM goes further where configuration files are concerned to not only detect and report changes to config settings but to also identify vulnerabilities.
- Category: File Integrity Monitoring
This is a 3 step series examining why File Integrity Monitoring (FIM) is essential for the security of any business’ IT. This first section examines the need for malware detection, addressing the inevitable flaws in anti-virus systems using host intrusion detection system (HIDS) principles.
- Category: File Integrity Monitoring
Within the FIM technology market, there are choices to be made. Agent-based or agentless is the most common choice, but even then there are both SIEM and ‘pure-play’ FIM, solutions to choose between.
- Disable Windows Services
- What are the recommended Audit Policy settings for Windows & Linux
- Server Hardening Policy - Examples and Tips
- Server Hardening Checklist - Which Configuration Hardening Checklist Will Make My Server Most Secure?
- Windows Server 2008 2008R2 Hardening Guide
- File Integrity Monitoring Software
- Linux Server Hardening
- The Windows Advanced Audit Policy Configuration
- The Top Ten of Audit and Event Log Monitoring
- Which File Integrity Monitoring Technology Is Best For FIM? File Integrity Monitoring FIM or SIEM FIM?