Report
Download

Report

NTT Security Monthly Threat Report - November

In the November 2019 edition of the GTIC Monthly Threat Report, GTIC researchers observed and analysed activity and malware targeting the retail industry, providing a heads-up for the sector leading into the holiday shopping season. SPOILER: our data show that brute force attacks are still in the lead! Sticking with that, GTIC researchers also highlighted the evolution – and continued increase – of brute force attacks against [email protected]$$w0rd$, along with some mitigation recommendations. In addition, NTT Ltd. privacy experts discuss privacy with regard to data control within the EU; it’s not as cut and dry as it sounds.
Download

Report
Download

Report

NTT Security Monthly Threat Report - October

In the October 2019 edition of the GTIC Monthly Threat Report, GTIC researchers take a look into the top targeted vulnerabilities during the month of October. HINT: number one is not a new vulnerability! In addition, we delve into Disinformation-as-a-Service campaigns, which can affect everything from advertising to elections; these types of campaigns aren't new, by any means, but have recently been back in the news. NTT also highlights some new contributors, including our newest colleagues at WhiteHat Security, who highlight DevSecOps as a key business driver, and our very own John South, who takes a deeper dive into Drone security and recommendations to keep them safe.
Download

Report
Download

Report

NTT Security Monthly Threat Report - September

In the September edition of the GTIC Monthly Threat Report, GTIC researchers observed and analyzed the continued evolution of ECHOBOT – a short synopsis is included, and be sure to read the blog post! GTIC researchers also highlighted attack profiles against the Manufacturing sector during September, as one of the most highly targeted industries, along with some mitigation recommendations. In addition, researchers take a peek into the most recent vBulletin RCE vulnerability, and, oddly, another look at the WannaCry vulnerability – yes, you still need to patch it.
Download

Report
Download

Report

NTT Security Monthly Threat Report - August

In the August, 2019 edition of the GTIC Monthly Threat Report, NTT discusses initiatives to arm security analysts with more information faster, through automated bot detection and through our partnership with the Cyber Threat Alliance. Analysts also discuss the software which has been most targeted by attackers in August, and describes an evolution in attack behavior by the APT41 cyber-espionage group.
Download

Solution / Service Overview
Download

Solution / Service Overview

Endpoint Security Services

Endpoint Security Services (ESS) offers support for a growing list of endpoint security vendors and products and is a unique solution designed to increase the speed and accuracy of human-driven response time using Endpoint Detection and Response (EDR) technologies.
Download

Report
Download

Report

NTT Security Monthly Threat Report - July

In the July edition of the GTIC Monthly Threat Report, GTIC researchers analyzed hostile activity targeting the health care industry, along with recommendations for highest priority patching. Researchers additionally start a series on using the Dark Web, include a summary of some of the most active malware over the past month, and take a look at Sea Turtle, a campaign which focuses on abusing the domain name service (DNS) of targeted organizations.
Download

Report
Download

Report

NTT Security Monthly Threat Report - June

In the June edition of the GTIC Monthly Threat Report, GTIC researchers analyzed campaigns against a high risk vulnerability in EXIM, along with some mitigation recommendations. In addition, researchers take a peek into GDPR implications after a year in effect and look into threats against Linux systems by HiddenWasp. Most impactful, though, may be the threat posed by the BlueKeep vulnerability - even if it's not "there yet," the potential is: patching is your best bet.”
Download

Report
Download

Report

NTT Security Monthly Threat Report - May

In this report, GTIC researchers analyze recent ransomware campaigns impacting municipalities and also provide recommendations to help you ensure your organization is ready to react to a ransomware attack. Researchers also unpack the dramatic uptick in the number of O365 credential-stealing attacks, concluding the report with detailed analysis into a highly targeted Oracle WebLogic vulnerability (CVE-2019-2725).
Download

Solution / Service Overview
Download

Solution / Service Overview

Web Application Firewall as a Service

Unattended firewalls won’t protect for long, and finding time to support them can seem impossible. Web Application Firewall as a Service (WAFaaS) is a worldwide managed service which provides a comprehensive solution to the broad range of issues inherent to managing a complex security network.
Download

Solution / Service Overview
Download

Solution / Service Overview

Operational Technology (OT) Security Services

Our OT Security Services help improve your security profile with respect to key ICS/SCADA systems – from monitoring and technical services, access controls and encryption, to design and assessment.
Download

Thought Leadership / White Paper
Download

Thought Leadership / White Paper

Who is responsible for securing the connected car?

The number of intelligent cars on the road is growing. In the event of a cyber attack on a vehicle, who is responsible – the driver, the manufacturer or the suppliers of car parts?
Download

Report
Download

Report

NTT Security Monthly Threat Report - April

In this report, GTIC researchers provide the results of their in-depth analysis into web application attacks, and also provide key insights into the increasing cyber threat from nation-state-sponsored threat actors from North Korea and Iran. Researchers also deliver an overview of Operation ShadowHammer, a sophisticated attack on the supply chain.
Download

Report
Download

Report

NTT Security Monthly Threat Report - March

In the March 2019 GTIC Monthly Threat Report, security researchers analyzed web browser statistics, to include existing vulnerabilities, providing further details on the latest Chrome zero-day vulnerability.  Additionally, researchers took a look at how the dark web could affect your organization, outlining why it matters to the enterprise, also providing insight into new 4G and 5G vulnerabilities which affect almost all cell providers around the globe.
Download

Solution / Service Overview
Download

Solution / Service Overview

Security Operations Center as a Service (SOCaaS)

If your board asked what the potential impact of a security incident would be on your business — would your existing security operations model help you answer the question and give you the right evidence to support your response? NTT Security has developed SOCaaS, a set of complementary tailored solutions to rapidly build and maintain your optimum security operations model.
Download

Solution / Service Overview
Download

Solution / Service Overview

Governance, Risk and Compliance

Our highly-skilled consulting team will deliver your governance, risk and compliance (GRC) needs across the whole organisation, to meet corporate goals
Download

Report
Download

Report

NTT Security Monthly Threat Report - February

In this report, NTT Security researchers detail a few of the increased risks associated with IoT implementation, providing actionable recommendations to help guide successful IoT implementation in your environment. Researchers also take a look at Iran's increase in cyber-espionage, outlining why it matters to the enterprise and also provide insight into a significant vulnerability impacting a popular open-source application.
Download

Solution / Service Overview
Download

Solution / Service Overview

Penetration Testing

Penetration testing is one of the most cost-effective ways to understand where your infrastructure and applications are at risk, so you can take action to mitigate the issue.
Download

Solution / Service Overview
Download

Solution / Service Overview

Cybersecurity Expertise in the Automotive Industry

As society makes the shift towards a future of fully autonomous cars, cybersecurity is crucial to accelerating mass adoption. The automotive industry must determine how to protect the safety of drivers, passengers, and pedestrians from the threat of car hacking.
Download

Solution / Service Overview
Download

Solution / Service Overview

Cybersecurity Expertise in Government and the Public Sector

Cyber attacks on governments, councils, agencies and statutory bodies are increasing. These major bodies need to step up their readiness, but how can that best be achieved?
Download

Solution / Service Overview
Download

Solution / Service Overview

Cybersecurity Expertise in the Oil & Gas Sector

With digitization on the rise, and cyber criminals often one step ahead of the security learning curve, the oil and gas industry faces a growing number of security threats.
Download

Report
Download

Report

NTT Security Monthly Threat Report - January

In the January 2019 GTIC Monthly Threat Report, security researchers provide an overview of new cybersecurity practices designed for the health care sector and also provide analysis of the security impact of upcoming 5G rollouts. Analysts also dive into the inner workings of an unprecedented DNS hijacking campaign and analyze findings surrounding attacks on Apache products GTIC researchers observed throughout the month.
Download

Solution / Service Overview
Download

Solution / Service Overview

Incident Response and Forensics

NTT's Incident Response services help you to minimize the impact and cost of an incident, as well as protecting your valuable data, intelligently adapting to prevent further incidents.
Download

Solution / Service Overview
Download

Solution / Service Overview

Cybersecurity Expertise in Utilities

While a cyber attack hasn’t successfully shut down any power grid for more than a few hours, the threat is real. In the face of persistent and growing attempts to breach defenses, utility companies are challenged to understand the scale of current risk and determine the best response.
Download

Report
Download

Report

NTT Security Monthly Threat Report - December

In this final GTIC Monthly Threat Report for the year, GTIC researchers take a look back at the biggest campaigns, most-attacked vulnerabilities, and most vulnerable applications during 2018. In addition, GTIC researchers analyze patterns during 2018, making recommendations for the year ahead. Lastly, researchers provide insight into a report on the shifting attack patterns and intrusion set of APT TA505.
Download

Solution / Service Overview
Download

Solution / Service Overview

Managed Security Services (MSS)

Using our advanced analytics to find the ‘needle in the haystack’ to reduce the impact of threats on your organization

Download

Thought Leadership / White Paper
Download

Thought Leadership / White Paper

NTT Security Predictions 2019

No-one has a crystal ball, but here at NTT Security we’ve worked with our security experts around the world to identify trends that affect organizations and could emerge in the near future.
Download

Report
Download

Report

NTT Security Monthly Threat Report - November

In this Holiday Edition of the GTIC Monthly Threat Report, NTT Security analysts focus on several retail-focused topics aimed at helping you to safely navigate this holiday shopping season.
Download

Solution / Service Overview
Download

Solution / Service Overview

Web Security Services (WSS)

Our Web Security Services (WSS) combine Symantec’s Web Security Service with NTT’s real-time threat intelligence and analysis to deliver strengthened managed threat detection and prevention capabilities.
Download

Thought Leadership / White Paper
Download the Whitepaper

Thought Leadership / White Paper

The accidental hacker

We tend to associate insider threats with malicious employees who steal information, sabotage IT systems, or manipulate data. But just as significant is the damage done by negligence and error.
Download the Whitepaper

Solution / Service Overview
Download

Solution / Service Overview

Cybersecurity Expertise in Manufacturing

Digital technology is the cornerstone of today's manufacturing processes and the scale and complexity of this digital environment is a growing challenge. Manufacturers need to urgently take steps to protect themselves and get demonstrable cybersecurity safeguards in place.
Download

Report
Download

Report

NTT Security Monthly Threat Report - October

In this report, GTIC researchers present their analysis in a feature article covering the topic of U.S. election hacking, seeking to answer the question, “Can the U.S. elections be hacked, and if so, how?” Researchers also provide a breakdown of a recent cryptojacking incident where attackers had been leveraging the leaked NSA exploit, EternalBlue. The report wraps up with analysis into the technical side of the most-attacked network routers and most affected industries of those router attacks.
Download

Thought Leadership / White Paper
Download

Thought Leadership / White Paper

The rapid evolution of deception technologies

New approaches of deception technology are proving more effective at capturing breaches and less expensive to implement and manage. But the pace of innovation has led to some confusion about their efficacy, capabilities and appropriate use cases.
Download

Thought Leadership / White Paper
Download

Thought Leadership / White Paper

Securing operational technology: How vulnerable is our critical national infrastructure?

Critical infrastructure and industrial plant control systems are coming under scrutiny from both attackers and defenders. So what can we do to better protect ourselves against the threat of a serious breach?
Download

Thought Leadership / White Paper
Download

Thought Leadership / White Paper

Cybercrime Insurance. A growing market. Are you covered?

Is your organization considering taking out cybercrime insurance? Think carefully about what you expect the policy to deliver. Are you adequately covered? Could your policy be invalidated? And what cybercrime safety measures would insurers expect you to have in place?
Download

Report
Download

Report

NTT Security Monthly Threat Report - September

In this report, GTIC researchers provide an overview of Ursnif Trojan activity and Operation AppleJeus, explaining North Korea’s continued interest in cryptocurrency. Researchers also detail their research into a recently released Cisco vulnerability, along with analysis into a chain of vulnerabilities targeting Axis IP cameras.
Download

Solution / Service Overview
Download

Solution / Service Overview

Cybersecurity Expertise in Retail

Every area of retail is touched by technology, with drone-based deliveries, RFID chips, electronic shelf-edge technology and blockchain based loyalty programs. This growing attack surface makes retailers vulnerable to cyber attacks as a rich seam of credit card information and personal customer information means that retail is an irresistible attack target.
Download

Solution / Service Overview
Download

Solution / Service Overview

Cybersecurity Expertise in Private & Public Healthcare

Globally, healthcare providers face some unique threats with an increasing number of connected medical devices and vendor-owned equipment in use. How can healthcare organizations secure this wide range of devices within their infrastructure, with the added complexity of demonstrating regulatory compliance?
Download

Report
Download

Report

NTT Security Monthly Threat Report - August

In this report, NTT Security researchers present their findings on cryptojacking, to include the industries most affected by cryptojacking. Researchers also present the NTT Security view of software supply chain attacks, along with discussing ongoing research into how to better secure IoT devices.
Download

Solution / Service Overview
Download

Solution / Service Overview

Technical Consulting

Keeping up-to-date with new solutions and making them work securely and deliver value for your organization is tough.  That's why organizations trust NTT to provide Technical Consulting services that meet the security challenges faced by global business today.
Download

Solution / Service Overview
Download

Solution / Service Overview

Cybersecurity expertise in Business & Professional Services

Given the high-profile of many professional services clients, an attack that exposes confidential data strikes at the very heart of a consultant’s obligation to safeguard client information. How should professional services organizations step-up their cyber readiness to ensure confidential information stays that way?
Download

Report
Download

Report

NTT Security Monthly Threat Report - July

In this report, NTT Security researchers provide a brief overview of the increase in cyber activity surrounding the 2018 FIFA World Cup. Researchers also provide insight into the increased insider threat risk brought about by collaboration tools within the work environment, wrapping up the report by sharing information and remediation details for a recent Cisco remote code execution vulnerability.
Download

Solution / Service Overview
Download

Solution / Service Overview

Enterprise Security Monitoring Services

Our Enterprise Security Monitoring Services provide you with 24/7 log monitoring and analysis so you can comply with robust log monitoring requirements.
Download

Report
Download

Report

NTT Security Monthly Threat Report - June

In June, GTIC security researchers took another analytic deep dive into Trickbot malspam campaigns, with their research uncovering more threat actor TTPs. Researchers also provided insight into a noteworthy vulnerability in Cisco security appliances, along with timely reporting on North Korean cyber activity targeting multiple industries across the globe.
Download

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Protect yourself against the growing threat of ransomware

Ransomware is a real business problem, as recent events have demonstrated. This paper looks at the rise of ransomware, its evolution and changing attack methods, the cost to business - and the steps NTT Security recommends organizations must take to mitigate the risk of attack.
Download the report

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

Managing the risk of Multi-Sourcing

Many companies today are outsourcing business-critical IT services to multiple providers. How can they ensure visibility and management of the security risks these providers bring?
Download the report

Report
Download

Report

NTT Security Monthly Threat Report - May

In this report, GTIC researchers present a special report on malspam, providing insights into the most commonly seen malware families, as well as threat actor TIPs. NTT Security researchers also provide short overviews of the recent Spectre and EFAIL vulnerabilites, along with a look into China's intelligence apparatus, the Winnti Group.
Download

Report
Download the report

Report

Risk:Value 2017 Report

This report highlights the challenges with and attitudes to cybersecurity across global organizations, with a particular focus on the upcoming GDPR.
Download the report

Report
Download

Report

Risk:Value 2018 Executive Summary Report US

Many organizations are stuck in a reactive mindset when it comes to information security and would opt to pay a hacker's ransom rather than proactively invest in security. That’s a key finding in this year's Risk:Value 2018 Report.
Download

Thought Leadership / White Paper
Download the paper now

Thought Leadership / White Paper

Security in Mergers & Acquisitions

Going After The Weak Link - In this paper, we explain why information security is a key element of successful merger and acquisition projects and what you need to know.
Download the paper now

Solution / Service Overview
Download the Solution Overview

Solution / Service Overview

Cybersecurity Expertise in Financial Services

Financial institutions have been addressing information security risk for decades, and cybersecurity remains a primary risk focus for the sector. It’s not a question of if, but when a cyber attack will occur.
Download the Solution Overview

Report
Download the report

Report

NTT Security Monthly Threat Report – April 2018

In this report, GTIC researchers highlight some findings of the newly-released NTT Security 2018 Global Threat Intelligence Report (GTIR), as well as insight into the battle between ransomware and cryptojacking, the targeting of network infrastructure from suspected Russian threat actors, and the effectiveness of supply chain attacks.
Download the report

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – March 2018

In this report, GTIC researchers provide insight based on their research of the Dark Cloud botnet, deliver guidance on a recent Cisco IOS XE Software Static Credential vulnerability and provide updates on suspected North Korean and Chinese APT activity.
Download the report

Thought Leadership / White Paper
Download the Whitepaper

Thought Leadership / White Paper

More threats. Fewer experts. There’s a growing skills gap. How will you manage?

Too many threats; not enough security professionals: how the growing skills gap is driving the march towards managed security services (MSS)
Download the Whitepaper

Report
Download the report

Report

NTT Security Monthly Threat Report - February 2018

In this report, GTIC researchers provide analysis into their reverse engineering of the Agent Tesla malware, deliver guidance on a recent Cisco ASA remote code execution vulnerability and also provide updates on APT activity. Researchers also touch on ransomware’s refusal to take a backseat to cryptocurrency mining malware.
Download the report

Download the report

GTIC Monero Mining Malware Business Edition


Download the report

Report
Download the report

Report

NTT Security Monthly Threat Report - January 2018

In this report, the GTIC provides insight into the latest NTT Security research covering exploit attempts on Oracle WebLogic servers and also answers some questions about the Meltdown and Spectre vulnerabilities. Researchers wrap up the report with an overview of increased Chinese cyber activity, along with interesting findings on the cybersecurity status of nuclear weapons. 
Download the report

Report
Download the report

Report

NTT Security Monthly Threat Report – December 2017

In December 2017, GTIC researchers took a look at the global installations of cryptocurrency mining software, as well as highlighting targets and new tactics, techniques, and procedures from Iran, as well as North Korea.
Download the report

Thought Leadership / White Paper
Learn more

Thought Leadership / White Paper

NTT Security 2018 Security Trends and Predictions

From machine learning to IOT, cloud and DevSecOps to data security and GDPR, NTT Security experts predict what will shape the next 12 months in cybersecurity
Learn more

Report
Download the report

Report

NTT Security Monthly Threat Report – November 2017

In this report, GTIC researchers publish research concerning a recent spike in IoT attacks, provide an overview of the continuing HIDDEN COBRA campaign, and give detail on how APT28 (a.k.a., Sofacy Group, Pawn Storm) is using a popular Microsoft Office feature as an attack vector.
Download the report

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – October 2017

NTT Security researchers take at a look at how attackers are shifting their phishing TTPs, and uncovered some interesting findings. Researchers also provide summaries into some of the biggest vulnerabilities and attack campaigns of the year, to include the recent Wi-Fi network flaw (KRACK), Bad Rabbit ransomware, as well as Dragonfly 2.0, an APT with active, ongoing attack campaigns targeting critical infrastructure.
Download the report

Report
Download the report

Report

NTT Security Monthly Threat Report – September 2017

Exploit attempts against Apache took 4 out of the top 10 spots for the most exploited vulnerabilities in September, and keeping with the Apache theme, researchers took a look at what users can do about the Equifax breach. Additionally, researchers explored the very real challenges of combatting phishing attempts which crop up during and after natural disasters. Analysts round out the report by providing perspective on Dragonfly 2.0 (a.k.a., Energetic Bear).
Download the report

Solution / Service Overview
Learn More

Solution / Service Overview

Embedded Security

Every NTT client project starts with the basic premise that the technology and the way it fits into your existing infrastructure, must be secure. We work seamlessly with our team of security experts at NTT Security, to embed security into every project.
Learn More

Thought Leadership / White Paper
Read the Whitepaper

Thought Leadership / White Paper

Augmenting traditional security monitoring with Managed Detection and Response (MDR)

Managed Detection and Response (MDR) builds on existing MSS services; enabling organizations to improve traditional threat detection and response capabilities; without the expense of investing in additional staff.
Read the Whitepaper

Technical Insight / Datasheet
Learn More

Technical Insight / Datasheet

How to Choose an MSSP

Choosing a Managed Security Services Provider is a complex decision for any organization. This paper looks at the top ten criteria for successfully choosing an MSSP.




Learn More

Technical Insight / Datasheet
Read More

Technical Insight / Datasheet

Critical Incident Response Services

NTT Security Critical Incident Response (CIR) Services provide incident response planning and testing, in addition to rapid response to minimize the impact of security incidents.
Read More

Thought Leadership / White Paper
Download

Thought Leadership / White Paper

How to Write an MSSP RFP

The document aims to assist organizations with putting together a well-written RFP that will not only ask the right questions, but also get the correct responses to make an educated decision about which provider to choose.



Download

Thought Leadership / White Paper
Download

Thought Leadership / White Paper

Unlock the full potential of data centre virtualization with micro-segmentation

Organizations want software-defined security to help them solve critical security breaches by stopping attackers from moving laterally within the data centre.
Download

Case study
Download

Case study

BAMA futureproofs its security environment and moves to a managed security services partnership with NTT Security

Fresh food wholesaler outsources day-to-day security operations, benefiting from increased bandwidth  to focus on security strategy.

Download

Solution / Service Overview
Download the report

Solution / Service Overview

Risk Remediation

As threats become more complex and increasingly disruptive, organizations must consider an effective risk management strategy. NTT Security's range of Risk Remediation services help protect your organization’s valuable assets.


Download the report

Solution / Service Overview
Download

Solution / Service Overview

Strategic Consulting

Our strategic consulting supports organizations seeking external advice to evolve a business-focused security strategy, to support the business to navigate the opportunities of the digital landscape.
Download

Solution / Service Overview
Download the report

Solution / Service Overview

Security Automation

Why do many organizations have little or no automation between the multiple systems employed to keep the business safe? NTT Security will work with you to present the right use cases for security automation, identifying the solutions that provide the most value to your business.


Download the report

Case study
Download the case study

Case study

Risk Insight Express Case Study

Multinational trading company improves security and risk insight: Working with NTT Security to identify the underlying causes of security breaches, this customer was able to decide where to prioritize implementation of controls according to the level of risk.


Download the case study

Solution / Service Overview
Download the report

Solution / Service Overview

Enterprise Security Program Services (ESPS)

NTT Security Enterprise Security Program Services (ESPS) are designed to ensure the Managed Security Services (MSS) are aligned to your risk, security and compliance programs and meet your service expectations.


Download the report

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – August 2017

In this month's report, GTIC researchers analyzed the Locky malspam campaign (lukitus) and provide insight into attack vectors which threat actors began leveraging during the month of August. Additionally, the GTIC provides brief highlights on APT28, who have set their sights on targeting Wi-Fi networks in the hospitality industry. Finally, a worrying new trend in banking Trojans is worming its way into this malware.
Download the report

Solution / Service Overview
Download the report

Solution / Service Overview

EU General Data Protection Regulation Services for US organizations

Data protection is an ongoing issue for all organizations and the countdown to global compliance with the new EU General Data Protection Regulation (GDPR) in May 2018 has begun. Wherever you are on your journey, NTT Security’s GDPR assessments will provide you with greater clarity around the impact of GDPR compliance.

Download the report

Thought Leadership / White Paper
Download the report

Thought Leadership / White Paper

The international impact and opportunity of the General Data Protection Regulation (GDPR)

In an uncertain world, one thing international organizations can be sure about is the need to mark 25 May 2018 in their calendars. On that date, the new General Data Protection Regulation will come into effect. This will impact every organization in the world that collects or retains personal identifiable data from any European individual.

Download the report

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – July 2017

GTIC researchers took a look at what phase of the Cyber Kill Chain attackers spent the most time in, in addition to identifying over 525,000 hosts vulnerable to a buffer overflow vulnerability, finally providing details on a critical list of Oracle vulnerabilities.
Download the report

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – June 2017

This month's threat report analyzes a recent Trickbot phishing campaign, in which attackers embedded malicious VBA scripts in Microsoft Word documents and bombarded multiple industries with phishing emails.
Download the report

Thought Leadership / White Paper
Download

Thought Leadership / White Paper

Protect yourself against the growing threat of ransomware and other malware variants

Ransomware is a very real business problem, as recent events have demonstrated. This paper looks at the rise of ransomware; the evolution of ransomware and attack methods; the cost to business; and the steps that NTT Security recommends organizations must take to mitigate the risk of attack.
Download

Report
Download the report

Report

Report: NTT Security Monthly Threat Report – May 2017

WannaCry was, and is, big news. The NTT Security Monthly Threat Report for May 2017 provides practical details relating to the attack, as well as technical analysis of the underlying SMB vulnerabilities. For a detailed description of WannaCry, both from a technical perspective, as well as a practical one, get this month's threat report.
Download the report

Technical Insight / Datasheet
Download

Technical Insight / Datasheet

Advanced Analytics with Artificial Intelligence

Advanced Analytics with Artificial Intelligence: Machine learning combats advanced attacks
Download

Thought Leadership / White Paper
Download

Thought Leadership / White Paper

Are you ready for the industrial Internet of Things?

By 2020 there will be 32 billion connected devices on the planet. Is your business ready to securely embrace the opportunities of the internet of things (IOT)?

Download