NTA Monitor

nta-monitor.com

NTA Monitor is a leading international IT security specialist with offices in the UK and Malaysia. NTA Monitor was founded in 1997, and has over sixteen years experience of providing a range of IT security testing, auditing and consultancy services. Our client base includes some of the world’s high profile companies, and large government organisations. We work with clients from all sectors including government, financial, manufacturing, legal, retail and IT services. NTA Monitor was a founder member of the CESG CHECK and CREST schemes, and has continually held the highest “green light” status since the start of the scheme in 1998. We are also a PCI ASV scanning vendor, and deliver services through the NPIA and OGC frameworks.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Enterprise Security

CONFLUERA CLOUD RESEARCH FINDS CYBERSECURITY CONCERN AS BIGGEST OBSTACLE TO CLOUD AND MULTI-CLOUD ADOPTION

Confluera | February 19, 2022

news image

Confluera, the leading provider of next-generation cloud cyber attack detection and response, today released the findings of their latest research report, which explores how IT leaders detect, evaluate, and act against cybersecurity threats in today's cloud environment. The study, 2022 Cloud Cybersecurity Survey Report, showcases the perspective of 200 U.S. IT leaders at medium to large sized organizations and how they are tackling the increasingly complex remote, cloud-centric IT security l...

Read More

Data Security

CONTROLCASE PARTNERS WITH CONNECTWISE & FIFTHWALL SOLUTIONS TO INCREASE MSP CYBERSECURITY MATURITY & BRIDGE ACCESS TO CYBER INSURANCE.

ControlCase | July 11, 2022

news image

ControlCase, a leading provider of IT Security Certifications and Continuous Compliance Services announced its recent partnership with ConnectWise and FifthWall Solutions. Under this partnership, Managed Service Providers (MSPs) can now access the ConnectWise MSP+ security best practices framework from the ControlCase Compliance HubTM platform for both self-assessment and verification by ControlCase. This partnership also provides the rate-quote-bind assistance required for procuring insurance.<...

Read More

Enterprise Security, Platform Security, Software Security

ATTACKIQ LAUNCHES BREACH AND ATTACK SIMULATION-AS-A-SERVICE, DELIVERING BREACH AND ATTACK SIMULATION SOLUTIONS TO EVERYONE

Businesswire | April 03, 2023

news image

AttackIQ®, the leading independent vendor of Breach and Attack Simulation (BAS) solutions, today announced the availability of AttackIQ Ready!, a fully managed breach and attack simulation service that leverages years of advanced content and actionable reporting to improve organizations’ security posture and security program performance. The service was designed to simplify the execution of a continuous security validation program, showing results in real-time and orch...

Read More

HACKER LEAKS MORE THAN 500,000 TELNET CREDENTIALS

CISOMAG | January 20, 2020

news image

As reported by ZDNet, a hacker who seems to be a DDoS-for-hire (DDoS booter) service operator, has published a massive list of 515,000 Telnet credentials consisting passwords of servers, home routers, and IoT (Internet of Things) devices. The published list also includes IP address of each device along with a username and password of its Telnet service. Telnet is a remote access protocol that can be used to control devices over the internet. The hacker compiled the leaked list by scanning the in...

Read More
news image

Enterprise Security

CONFLUERA CLOUD RESEARCH FINDS CYBERSECURITY CONCERN AS BIGGEST OBSTACLE TO CLOUD AND MULTI-CLOUD ADOPTION

Confluera | February 19, 2022

Confluera, the leading provider of next-generation cloud cyber attack detection and response, today released the findings of their latest research report, which explores how IT leaders detect, evaluate, and act against cybersecurity threats in today's cloud environment. The study, 2022 Cloud Cybersecurity Survey Report, showcases the perspective of 200 U.S. IT leaders at medium to large sized organizations and how they are tackling the increasingly complex remote, cloud-centric IT security l...

Read More
news image

Data Security

CONTROLCASE PARTNERS WITH CONNECTWISE & FIFTHWALL SOLUTIONS TO INCREASE MSP CYBERSECURITY MATURITY & BRIDGE ACCESS TO CYBER INSURANCE.

ControlCase | July 11, 2022

ControlCase, a leading provider of IT Security Certifications and Continuous Compliance Services announced its recent partnership with ConnectWise and FifthWall Solutions. Under this partnership, Managed Service Providers (MSPs) can now access the ConnectWise MSP+ security best practices framework from the ControlCase Compliance HubTM platform for both self-assessment and verification by ControlCase. This partnership also provides the rate-quote-bind assistance required for procuring insurance.<...

Read More
news image

Enterprise Security, Platform Security, Software Security

ATTACKIQ LAUNCHES BREACH AND ATTACK SIMULATION-AS-A-SERVICE, DELIVERING BREACH AND ATTACK SIMULATION SOLUTIONS TO EVERYONE

Businesswire | April 03, 2023

AttackIQ®, the leading independent vendor of Breach and Attack Simulation (BAS) solutions, today announced the availability of AttackIQ Ready!, a fully managed breach and attack simulation service that leverages years of advanced content and actionable reporting to improve organizations’ security posture and security program performance. The service was designed to simplify the execution of a continuous security validation program, showing results in real-time and orch...

Read More
news image

HACKER LEAKS MORE THAN 500,000 TELNET CREDENTIALS

CISOMAG | January 20, 2020

As reported by ZDNet, a hacker who seems to be a DDoS-for-hire (DDoS booter) service operator, has published a massive list of 515,000 Telnet credentials consisting passwords of servers, home routers, and IoT (Internet of Things) devices. The published list also includes IP address of each device along with a username and password of its Telnet service. Telnet is a remote access protocol that can be used to control devices over the internet. The hacker compiled the leaked list by scanning the in...

Read More

Resources

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us