Report
Download the report

Report

NTT Security Monthly Threat Report - June

In June, GTIC security researchers took another analytic deep dive into Trickbot malspam campaigns, with their research uncovering more threat actor TTPs. Researchers also provided insight into a noteworthy vulnerability in Cisco security appliances, along with timely reporting on North Korean cyber activity targeting multiple industries across the globe.
Download

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Protect yourself against the growing threat of ransomware

Ransomware is a real business problem, as recent events have demonstrated. This paper looks at the rise of ransomware, its evolution and changing attack methods, the cost to business - and the steps NTT Security recommends organizations must take to mitigate the risk of attack.

Solution / Service Overview
Download the report

Solution / Service Overview

Managed Security Services (MSS)

Using our advanced analytics, find the ‘needle in the haystack’ to reduce the impact of threats on your organization

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Managing the risk of Multi-Sourcing

Many companies today are outsourcing business-critical IT services to multiple providers. How can they ensure visibility and management of the security risks these providers bring?

Report
Download the report

Report

NTT Security Monthly Threat Report - May

In this report, GTIC researchers present a special report on malspam, providing insights into the most commonly seen malware families, as well as threat actor TIPs. NTT Security researchers also provide short overviews of the recent Spectre and EFAIL vulnerabilites, along with a look into China's intelligence apparatus, the Winnti Group.
Download

Report
Download the report

Report

Risk:Value 2018 Executive Summary Report US

Many organizations are stuck in a reactive mindset when it comes to information security and would opt to pay a hacker's ransom rather than proactively invest in security. That’s a key finding in this year's Risk:Value 2018 Report.
Download

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Security in Mergers & Acquisitions

Going After The Weak Link - In this paper, we explain why information security is a key element of successful merger and acquisition projects and what you need to know.
Download the paper now

Report
Download the report

Report

NTT Security Monthly Threat Report – April 2018

In this report, GTIC researchers highlight some findings of the newly-released NTT Security 2018 Global Threat Intelligence Report (GTIR), as well as insight into the battle between ransomware and cryptojacking, the targeting of network infrastructure from suspected Russian threat actors, and the effectiveness of supply chain attacks.
Download the report

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – March 2018

In this report, GTIC researchers provide insight based on their research of the Dark Cloud botnet, deliver guidance on a recent Cisco IOS XE Software Static Credential vulnerability and provide updates on suspected North Korean and Chinese APT activity.
Download the report

Report
Download the report

Report

NTT Security Monthly Threat Report - February 2018

In this report, GTIC researchers provide analysis into their reverse engineering of the Agent Tesla malware, deliver guidance on a recent Cisco ASA remote code execution vulnerability and also provide updates on APT activity. Researchers also touch on ransomware’s refusal to take a backseat to cryptocurrency mining malware.
Download the report

Report
Download the report

Report

NTT Security Monthly Threat Report - January 2018

In this report, the GTIC provides insight into the latest NTT Security research covering exploit attempts on Oracle WebLogic servers and also answers some questions about the Meltdown and Spectre vulnerabilities. Researchers wrap up the report with an overview of increased Chinese cyber activity, along with interesting findings on the cybersecurity status of nuclear weapons. 
Download the report

Report
Download the report

Report

NTT Security Monthly Threat Report – December 2017

In December 2017, GTIC researchers took a look at the global installations of cryptocurrency mining software, as well as highlighting targets and new tactics, techniques, and procedures from Iran, as well as North Korea.
Download the report

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

NTT Security 2018 Security Trends and Predictions

From machine learning to IOT, cloud and DevSecOps to data security and GDPR, NTT Security experts predict what will shape the next 12 months in cybersecurity
Learn more

Report
Download the report

Report

NTT Security Monthly Threat Report – November 2017

In this report, GTIC researchers publish research concerning a recent spike in IoT attacks, provide an overview of the continuing HIDDEN COBRA campaign, and give detail on how APT28 (a.k.a., Sofacy Group, Pawn Storm) is using a popular Microsoft Office feature as an attack vector.
Download the report

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – October 2017

NTT Security researchers take at a look at how attackers are shifting their phishing TTPs, and uncovered some interesting findings. Researchers also provide summaries into some of the biggest vulnerabilities and attack campaigns of the year, to include the recent Wi-Fi network flaw (KRACK), Bad Rabbit ransomware, as well as Dragonfly 2.0, an APT with active, ongoing attack campaigns targeting critical infrastructure.
Download the report

Report
Download the report

Report

NTT Security Monthly Threat Report – September 2017

Exploit attempts against Apache took 4 out of the top 10 spots for the most exploited vulnerabilities in September, and keeping with the Apache theme, researchers took a look at what users can do about the Equifax breach. Additionally, researchers explored the very real challenges of combatting phishing attempts which crop up during and after natural disasters. Analysts round out the report by providing perspective on Dragonfly 2.0 (a.k.a., Energetic Bear).
Download the report

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Securing operational technology: How vulnerable is our critical national infrastructure?

Critical infrastructure and industrial plant control systems are coming under scrutiny from both attackers and defenders. So what can we do to better protect ourselves against the threat of a serious breach?
Learn Here

Solution / Service Overview
Download the report

Solution / Service Overview

Embedded Security

Every NTT client project starts with the basic premise that the technology and the way it fits into your existing infrastructure, must be secure. We work seamlessly with our team of security experts at NTT Security, to embed security into every project.
Learn More

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Augmenting traditional security monitoring with Managed Detection and Response (MDR)

Managed Detection and Response (MDR) builds on existing MSS services; enabling organizations to improve traditional threat detection and response capabilities; without the expense of investing in additional staff.
Read the Whitepaper

Technical Insight / Datasheet
Download the report

Technical Insight / Datasheet

How to Choose an MSSP

Choosing a Managed Security Services Provider is a complex decision for any organization. This paper looks at the top ten criteria for successfully choosing an MSSP.




Learn More

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Threat Intelligence Defined

Some threat intelligence services in the market today do not offer true intelligence – simply access to minimally analyzed data. This NTT Security whitepaper provides an introduction to the fundamentals of intelligence and, by extension, threat intelligence.
Read the Whitepaper

Technical Insight / Datasheet
Download the report

Technical Insight / Datasheet

Critical Incident Response Services

NTT Security Critical Incident Response (CIR) Services provide incident response planning and testing, in addition to rapid response to minimize the impact of security incidents.
Read More

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

How to Write an MSSP RFP

The document aims to assist organizations with putting together a well-written RFP that will not only ask the right questions, but also get the correct responses to make an educated decision about which provider to choose.



Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Unlock the full potential of data centre virtualization with micro-segmentation

Organizations want software-defined security to help them solve critical security breaches by stopping attackers from moving laterally within the data centre.

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Defense Strategies for Advanced Threats

Mapping the SANS 20 Critical Security Controls to the Cyber Kill Chain

Organizations must develop capabilities not only to prevent successful attacks, but also to detect attacks in progress. See how.


Read More

Case study
Download the report

Case study

BAMA futureproofs its security environment and moves to a managed security services partnership with NTT Security

Fresh food wholesaler outsources day-to-day security operations, benefiting from increased bandwidth  to focus on security strategy.

Solution / Service Overview
Download the report

Solution / Service Overview

Technical Consulting

Keeping up-to-date with new solutions and making them work securely and deliver value for your organization is tough.  That's why organizations trust NTT Security to provide Technical Consulting services that meet the security challenges faced by global business today.


Learn More

Solution / Service Overview
Download the report

Solution / Service Overview

Risk Remediation

As threats become more complex and increasingly disruptive, organizations must consider an effective risk management strategy. NTT Security's range of Risk Remediation services help protect your organization’s valuable assets.


Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Embedding cybersecurity into digital transformation – a journey towards business resilience

Business resilience is no longer just about the ability to adapt and recover from disruption, but being able to anticipate and prevent any disruption in the first instance. To achieve this, security  needs to be the starting point, not an afterthought.


Learn More

Solution / Service Overview
Download the report

Solution / Service Overview

Security Automation

Why do many organizations have little or no automation between the multiple systems employed to keep the business safe? NTT Security will work with you to present the right use cases for security automation, identifying the solutions that provide the most value to your business.


Case study
Download the report

Case study

Risk Insight Express Case Study

Multinational trading company improves security and risk insight: Working with NTT Security to identify the underlying causes of security breaches, this customer was able to decide where to prioritize implementation of controls according to the level of risk.


Download the case study

Solution / Service Overview
Download the report

Solution / Service Overview

Strategic Consulting

NTT Security strategic consulting supports organizations seeking external advice to evolve a business-focused security strategy, to support the business to navigate the opportunities of the digital landscape.


Solution / Service Overview
Download the report

Solution / Service Overview

Enterprise Security Program Services (ESPS)

NTT Security Enterprise Security Program Services (ESPS) are designed to ensure the Managed Security Services (MSS) are aligned to your risk, security and compliance programs and meet your service expectations.


Report
Download the report

Report

Report: NTT Security Monthly Threat Report – August 2017

In this month's report, GTIC researchers analyzed the Locky malspam campaign (lukitus) and provide insight into attack vectors which threat actors began leveraging during the month of August. Additionally, the GTIC provides brief highlights on APT28, who have set their sights on targeting Wi-Fi networks in the hospitality industry. Finally, a worrying new trend in banking Trojans is worming its way into this malware.

Solution / Service Overview
Download the report

Solution / Service Overview

EU General Data Protection Regulation Services for US organizations

Data protection is an ongoing issue for all organizations and the countdown to global compliance with the new EU General Data Protection Regulation (GDPR) in May 2018 has begun. Wherever you are on your journey, NTT Security’s GDPR assessments will provide you with greater clarity around the impact of GDPR compliance.

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

The international impact and opportunity of the General Data Protection Regulation (GDPR)

In an uncertain world, one thing international organizations can be sure about is the need to mark 25 May 2018 in their calendars. On that date, the new General Data Protection Regulation will come into effect. This will impact every organization in the world that collects or retains personal identifiable data from any European individual.

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – July 2017

GTIC researchers took a look at what phase of the Cyber Kill Chain attackers spent the most time in, in addition to identifying over 525,000 hosts vulnerable to a buffer overflow vulnerability, finally providing details on a critical list of Oracle vulnerabilities.

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – June 2017

This month's threat report analyzes a recent Trickbot phishing campaign, in which attackers embedded malicious VBA scripts in Microsoft Word documents and bombarded multiple industries with phishing emails.

Solution / Service Overview
Download the report

Solution / Service Overview

Managed Security Services (MSS)

Using our advanced analytics to find the ‘needle in the haystack’ to reduce the impact of threats on your organization

Download

Solution / Service Overview
Download the report

Solution / Service Overview

NTT Security Services Overview

NTT Security services are delivered via three pillars: Strategic Consulting; Managed Security; and Technical Consulting.

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Protect yourself against the growing threat of ransomware and other malware variants

Ransomware is a very real business problem, as recent events have demonstrated. This paper looks at the rise of ransomware; the evolution of ransomware and attack methods; the cost to business; and the steps that NTT Security recommends organizations must take to mitigate the risk of attack.
Download

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – May 2017

WannaCry was, and is, big news. The NTT Security Monthly Threat Report for May 2017 provides practical details relating to the attack, as well as technical analysis of the underlying SMB vulnerabilities. For a detailed description of WannaCry, both from a technical perspective, as well as a practical one, get this month's threat report.

Technical Insight / Datasheet
Download the report

Technical Insight / Datasheet

Advanced Analytics with Artificial Intelligence

Advanced Analytics with Artificial Intelligence: Machine learning combats advanced attacks
Download

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Are you ready for the industrial Internet of Things?

By 2020 there will be 32 billion connected devices on the planet. Is your business ready to securely embrace the opportunities of the internet of things (IOT)?

Case study
Download the report

Case study

Quick Group serves up increased security with NTT Com Security

Fast Food chain enhances threat detection capability and improves IT security system without rebuilding it and without disrupting the business

Solution / Service Overview
Download the report

Solution / Service Overview

Governance; Risk and Compliance

Our highly-skilled consulting team will deliver your governance; risk and compliance (GRC) needs across the whole organisation; to meet corporate goals

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

More threats. Fewer experts. There’s a growing skills gap. How will you manage?

Too many threats; not enough security professionals: how the growing skills gap is driving the march towards managed security services (MSS)

Solution / Service Overview
Download the report

Solution / Service Overview

Incident Response

77% of organizations do not have formal incident response plans. If you had a security incident today; how would you deal with it?

Solution / Service Overview
Download the report

Solution / Service Overview

Risk Insight

Risk Insight helps organizations understand their risk exposure in a business context and recommends prioritized next steps to address the findings