Report
Download

Report

NTT Security Monthly Threat Report - October

In this report, GTIC researchers present their analysis in a feature article covering the topic of U.S. election hacking, seeking to answer the question, “Can the U.S. elections be hacked, and if so, how?” Researchers also provide a breakdown of a recent cryptojacking incident where attackers had been leveraging the leaked NSA exploit, EternalBlue. The report wraps up with analysis into the technical side of the most-attacked network routers and most affected industries of those router attacks.
Download

Thought Leadership / White Paper
Download

Thought Leadership / White Paper

Securing operational technology: How vulnerable is our critical national infrastructure?

Critical infrastructure and industrial plant control systems are coming under scrutiny from both attackers and defenders. So what can we do to better protect ourselves against the threat of a serious breach?
Download

Thought Leadership / White Paper
Download

Thought Leadership / White Paper

Cybercrime Insurance. A growing market. Are you covered?

Is your organization considering taking out cybercrime insurance? Think carefully about what you expect the policy to deliver. Are you adequately covered? Could your policy be invalidated? And what cybercrime safety measures would insurers expect you to have in place?
Download

Solution / Service Overview
Download

Solution / Service Overview

Advanced Security Operations Center (SOCaaS)

Are you winning the battle against information security complexity and cost? NTT Security has developed our Advanced Security Operations Center team, offering a set of complementary tailored solutions to rapidly build and maintain your optimum security operations model.
Download

Report
Download

Report

NTT Security Monthly Threat Report - September

In this report, GTIC researchers provide an overview of Ursnif Trojan activity and Operation AppleJeus, explaining North Korea’s continued interest in cryptocurrency. Researchers also detail their research into a recently released Cisco vulnerability, along with analysis into a chain of vulnerabilities targeting Axis IP cameras.
Download

Solution / Service Overview
Download

Solution / Service Overview

Cybersecurity Expertise in Retail

Every area of retail is touched by technology, with drone-based deliveries, RFID chips, electronic shelf-edge technology and blockchain based loyalty programs. This growing attack surface makes retailers vulnerable to cyber attacks as a rich seam of credit card information and personal customer information means that retail is an irresistible attack target.
Download

Solution / Service Overview
Download

Solution / Service Overview

Cybersecurity Expertise in Private & Public Healthcare

Globally, healthcare providers face some unique threats with an increasing number of connected medical devices and vendor-owned equipment in use. How can healthcare organizations secure this wide range of devices within their infrastructure, with the added complexity of demonstrating regulatory compliance?
Download

Report
Download

Report

NTT Security Monthly Threat Report - August

In this report, NTT Security researchers present their findings on cryptojacking, to include the industries most affected by cryptojacking. Researchers also present the NTT Security view of software supply chain attacks, along with discussing ongoing research into how to better secure IoT devices.
Download

Solution / Service Overview
Download

Solution / Service Overview

Cybersecurity expertise in Business & Professional Services

Given the high-profile of many professional services clients, an attack that exposes confidential data strikes at the very heart of a consultant’s obligation to safeguard client information. How should professional services organizations step-up their cyber readiness to ensure confidential information stays that way?
Download

Report
Download

Report

NTT Security Monthly Threat Report - July

In this report, NTT Security researchers provide a brief overview of the increase in cyber activity surrounding the 2018 FIFA World Cup. Researchers also provide insight into the increased insider threat risk brought about by collaboration tools within the work environment, wrapping up the report by sharing information and remediation details for a recent Cisco remote code execution vulnerability.
Download

Solution / Service Overview
Download

Solution / Service Overview

Enterprise Security Monitoring Services

Enterprise Security Monitoring Services from NTT Security provide you with 24/7 log monitoring and analysis so you can comply with robust log monitoring requirements.
Download

Report
Download

Report

NTT Security Monthly Threat Report - June

In June, GTIC security researchers took another analytic deep dive into Trickbot malspam campaigns, with their research uncovering more threat actor TTPs. Researchers also provided insight into a noteworthy vulnerability in Cisco security appliances, along with timely reporting on North Korean cyber activity targeting multiple industries across the globe.
Download

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Protect yourself against the growing threat of ransomware

Ransomware is a real business problem, as recent events have demonstrated. This paper looks at the rise of ransomware, its evolution and changing attack methods, the cost to business - and the steps NTT Security recommends organizations must take to mitigate the risk of attack.
Download the report

Solution / Service Overview
Download the report

Solution / Service Overview

Managed Security Services (MSS)

Using our advanced analytics, find the ‘needle in the haystack’ to reduce the impact of threats on your organization
Download the report

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Managing the risk of Multi-Sourcing

Many companies today are outsourcing business-critical IT services to multiple providers. How can they ensure visibility and management of the security risks these providers bring?
Download the report

Report
Download

Report

NTT Security Monthly Threat Report - May

In this report, GTIC researchers present a special report on malspam, providing insights into the most commonly seen malware families, as well as threat actor TIPs. NTT Security researchers also provide short overviews of the recent Spectre and EFAIL vulnerabilites, along with a look into China's intelligence apparatus, the Winnti Group.
Download

Report
Download

Report

Risk:Value 2018 Executive Summary Report US

Many organizations are stuck in a reactive mindset when it comes to information security and would opt to pay a hacker's ransom rather than proactively invest in security. That’s a key finding in this year's Risk:Value 2018 Report.
Download

Thought Leadership / White Paper
Download the paper now

Thought Leadership / White Paper

Security in Mergers & Acquisitions

Going After The Weak Link - In this paper, we explain why information security is a key element of successful merger and acquisition projects and what you need to know.
Download the paper now

Report
Download the report

Report

NTT Security Monthly Threat Report – April 2018

In this report, GTIC researchers highlight some findings of the newly-released NTT Security 2018 Global Threat Intelligence Report (GTIR), as well as insight into the battle between ransomware and cryptojacking, the targeting of network infrastructure from suspected Russian threat actors, and the effectiveness of supply chain attacks.
Download the report

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – March 2018

In this report, GTIC researchers provide insight based on their research of the Dark Cloud botnet, deliver guidance on a recent Cisco IOS XE Software Static Credential vulnerability and provide updates on suspected North Korean and Chinese APT activity.
Download the report

Report
Download the report

Report

NTT Security Monthly Threat Report - February 2018

In this report, GTIC researchers provide analysis into their reverse engineering of the Agent Tesla malware, deliver guidance on a recent Cisco ASA remote code execution vulnerability and also provide updates on APT activity. Researchers also touch on ransomware’s refusal to take a backseat to cryptocurrency mining malware.
Download the report

Report
Download the report

Report

NTT Security Monthly Threat Report - January 2018

In this report, the GTIC provides insight into the latest NTT Security research covering exploit attempts on Oracle WebLogic servers and also answers some questions about the Meltdown and Spectre vulnerabilities. Researchers wrap up the report with an overview of increased Chinese cyber activity, along with interesting findings on the cybersecurity status of nuclear weapons. 
Download the report

Report
Download the report

Report

NTT Security Monthly Threat Report – December 2017

In December 2017, GTIC researchers took a look at the global installations of cryptocurrency mining software, as well as highlighting targets and new tactics, techniques, and procedures from Iran, as well as North Korea.
Download the report

Thought Leadership / White Paper
Learn more

Thought Leadership / White Paper

NTT Security 2018 Security Trends and Predictions

From machine learning to IOT, cloud and DevSecOps to data security and GDPR, NTT Security experts predict what will shape the next 12 months in cybersecurity
Learn more

Report
Download the report

Report

NTT Security Monthly Threat Report – November 2017

In this report, GTIC researchers publish research concerning a recent spike in IoT attacks, provide an overview of the continuing HIDDEN COBRA campaign, and give detail on how APT28 (a.k.a., Sofacy Group, Pawn Storm) is using a popular Microsoft Office feature as an attack vector.
Download the report

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – October 2017

NTT Security researchers take at a look at how attackers are shifting their phishing TTPs, and uncovered some interesting findings. Researchers also provide summaries into some of the biggest vulnerabilities and attack campaigns of the year, to include the recent Wi-Fi network flaw (KRACK), Bad Rabbit ransomware, as well as Dragonfly 2.0, an APT with active, ongoing attack campaigns targeting critical infrastructure.
Download the report

Report
Download the report

Report

NTT Security Monthly Threat Report – September 2017

Exploit attempts against Apache took 4 out of the top 10 spots for the most exploited vulnerabilities in September, and keeping with the Apache theme, researchers took a look at what users can do about the Equifax breach. Additionally, researchers explored the very real challenges of combatting phishing attempts which crop up during and after natural disasters. Analysts round out the report by providing perspective on Dragonfly 2.0 (a.k.a., Energetic Bear).
Download the report

Solution / Service Overview
Learn More

Solution / Service Overview

Embedded Security

Every NTT client project starts with the basic premise that the technology and the way it fits into your existing infrastructure, must be secure. We work seamlessly with our team of security experts at NTT Security, to embed security into every project.
Learn More

Thought Leadership / White Paper
Read the Whitepaper

Thought Leadership / White Paper

Augmenting traditional security monitoring with Managed Detection and Response (MDR)

Managed Detection and Response (MDR) builds on existing MSS services; enabling organizations to improve traditional threat detection and response capabilities; without the expense of investing in additional staff.
Read the Whitepaper

Technical Insight / Datasheet
Learn More

Technical Insight / Datasheet

How to Choose an MSSP

Choosing a Managed Security Services Provider is a complex decision for any organization. This paper looks at the top ten criteria for successfully choosing an MSSP.




Learn More

Technical Insight / Datasheet
Read More

Technical Insight / Datasheet

Critical Incident Response Services

NTT Security Critical Incident Response (CIR) Services provide incident response planning and testing, in addition to rapid response to minimize the impact of security incidents.
Read More

Thought Leadership / White Paper
Download

Thought Leadership / White Paper

How to Write an MSSP RFP

The document aims to assist organizations with putting together a well-written RFP that will not only ask the right questions, but also get the correct responses to make an educated decision about which provider to choose.



Download

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Unlock the full potential of data centre virtualization with micro-segmentation

Organizations want software-defined security to help them solve critical security breaches by stopping attackers from moving laterally within the data centre.
Download the report

Case study
Download the report

Case study

BAMA futureproofs its security environment and moves to a managed security services partnership with NTT Security

Fresh food wholesaler outsources day-to-day security operations, benefiting from increased bandwidth  to focus on security strategy.

Download the report

Solution / Service Overview
Learn More

Solution / Service Overview

Technical Consulting

Keeping up-to-date with new solutions and making them work securely and deliver value for your organization is tough.  That's why organizations trust NTT Security to provide Technical Consulting services that meet the security challenges faced by global business today.


Learn More

Solution / Service Overview
Download the report

Solution / Service Overview

Risk Remediation

As threats become more complex and increasingly disruptive, organizations must consider an effective risk management strategy. NTT Security's range of Risk Remediation services help protect your organization’s valuable assets.


Download the report

Solution / Service Overview
Download the report

Solution / Service Overview

Security Automation

Why do many organizations have little or no automation between the multiple systems employed to keep the business safe? NTT Security will work with you to present the right use cases for security automation, identifying the solutions that provide the most value to your business.


Download the report

Case study
Download the case study

Case study

Risk Insight Express Case Study

Multinational trading company improves security and risk insight: Working with NTT Security to identify the underlying causes of security breaches, this customer was able to decide where to prioritize implementation of controls according to the level of risk.


Download the case study

Solution / Service Overview
Download the report

Solution / Service Overview

Strategic Consulting

NTT Security strategic consulting supports organizations seeking external advice to evolve a business-focused security strategy, to support the business to navigate the opportunities of the digital landscape.


Download the report

Solution / Service Overview
Download the report

Solution / Service Overview

Enterprise Security Program Services (ESPS)

NTT Security Enterprise Security Program Services (ESPS) are designed to ensure the Managed Security Services (MSS) are aligned to your risk, security and compliance programs and meet your service expectations.


Download the report

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – August 2017

In this month's report, GTIC researchers analyzed the Locky malspam campaign (lukitus) and provide insight into attack vectors which threat actors began leveraging during the month of August. Additionally, the GTIC provides brief highlights on APT28, who have set their sights on targeting Wi-Fi networks in the hospitality industry. Finally, a worrying new trend in banking Trojans is worming its way into this malware.
Download the report

Solution / Service Overview
Download the report

Solution / Service Overview

EU General Data Protection Regulation Services for US organizations

Data protection is an ongoing issue for all organizations and the countdown to global compliance with the new EU General Data Protection Regulation (GDPR) in May 2018 has begun. Wherever you are on your journey, NTT Security’s GDPR assessments will provide you with greater clarity around the impact of GDPR compliance.

Download the report

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

The international impact and opportunity of the General Data Protection Regulation (GDPR)

In an uncertain world, one thing international organizations can be sure about is the need to mark 25 May 2018 in their calendars. On that date, the new General Data Protection Regulation will come into effect. This will impact every organization in the world that collects or retains personal identifiable data from any European individual.

Download the report

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – July 2017

GTIC researchers took a look at what phase of the Cyber Kill Chain attackers spent the most time in, in addition to identifying over 525,000 hosts vulnerable to a buffer overflow vulnerability, finally providing details on a critical list of Oracle vulnerabilities.
Download the report

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – June 2017

This month's threat report analyzes a recent Trickbot phishing campaign, in which attackers embedded malicious VBA scripts in Microsoft Word documents and bombarded multiple industries with phishing emails.
Download the report

Solution / Service Overview
Download

Solution / Service Overview

Managed Security Services (MSS)

Using our advanced analytics to find the ‘needle in the haystack’ to reduce the impact of threats on your organization

Download

Solution / Service Overview
Download the report

Solution / Service Overview

NTT Security Services Overview

NTT Security services are delivered via three pillars: Strategic Consulting; Managed Security; and Technical Consulting.

Download the report

Thought Leadership / White Paper
Download

Thought Leadership / White Paper

Protect yourself against the growing threat of ransomware and other malware variants

Ransomware is a very real business problem, as recent events have demonstrated. This paper looks at the rise of ransomware; the evolution of ransomware and attack methods; the cost to business; and the steps that NTT Security recommends organizations must take to mitigate the risk of attack.
Download

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – May 2017

WannaCry was, and is, big news. The NTT Security Monthly Threat Report for May 2017 provides practical details relating to the attack, as well as technical analysis of the underlying SMB vulnerabilities. For a detailed description of WannaCry, both from a technical perspective, as well as a practical one, get this month's threat report.
Download the report

Technical Insight / Datasheet
Download

Technical Insight / Datasheet

Advanced Analytics with Artificial Intelligence

Advanced Analytics with Artificial Intelligence: Machine learning combats advanced attacks
Download

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Are you ready for the industrial Internet of Things?

By 2020 there will be 32 billion connected devices on the planet. Is your business ready to securely embrace the opportunities of the internet of things (IOT)?

Download the report

Case study
Download the report

Case study

Quick Group serves up increased security with NTT Com Security

Fast Food chain enhances threat detection capability and improves IT security system without rebuilding it and without disrupting the business

Download the report

Solution / Service Overview
Download the report

Solution / Service Overview

Governance; Risk and Compliance

Our highly-skilled consulting team will deliver your governance; risk and compliance (GRC) needs across the whole organisation; to meet corporate goals
Download the report

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

More threats. Fewer experts. There’s a growing skills gap. How will you manage?

Too many threats; not enough security professionals: how the growing skills gap is driving the march towards managed security services (MSS)

Download the report

Solution / Service Overview
Download the report

Solution / Service Overview

Incident Response

77% of organizations do not have formal incident response plans. If you had a security incident today; how would you deal with it?

Download the report

Solution / Service Overview
Download the report

Solution / Service Overview

Risk Insight

Risk Insight helps organizations understand their risk exposure in a business context and recommends prioritized next steps to address the findings

Download the report