Resources
Looking for Nipper user guides and support documentation?
Our support documentation has been relocated to docs.titania.com, a brand new platform to enable you to find the information you need more efficiently.
Scroll down to read our reports, articles, news and more.
Filter Resources
Search
Product
Content Type
Resource Type
NEW
Read More
Cisco Configuration Auditing & Security Best Practices
Cisco Configuration Auditing & Security Best Practices
As network architecture has become more complex, so too has the threat organizations face. Learn why vulnerability management and network configuration assessments are fundamental in ensuring the security of Cisco routers, switches and firewalls.
NEW
Read More
Proactive Security Solutions Infographic
Proactive Security Solutions Infographic
An infographic which summarises the key report findings, top 3 priorities and the core challenges organizations need to overcome.
NEW
Watch Video
Introduction to Nipper
Introduction to Nipper
In this webinar, we’ll introduce Nipper and show you how to automate accurate, on-demand security assessments for routers, switches, and firewalls.
NEW
Read More
NCSC CAF Automation Capability Summary
NCSC CAF Automation Capability Summary
Your guide to the Contributing Outcome and Indicator of Good Practice evidence automated by Nipper Enterprise.
NEW
Read More
Emerging Best Practice in the Use of Proactive Security Solutions
Emerging Best Practice in the Use of Proactive Security Solutions
Research, carried out by Omdia, reveals more than 70% of organizations have increased spending on Proactive Security solutions to improve the attack surface.
Nipper Enterprise Solution Guide
Nipper Enterprise Solution Guide
Developing operational resilience - Your guide to proactive network security with Nipper Enterprise
Nipper Product Overview
Nipper Product Overview
Delivering security from compliance - Automating accurate, on-demand router, switch and firewall configuration security assessments with Nipper
PCI DSS 4.0 Mapping Document
PCI DSS 4.0 Mapping Document
Titania software is trusted by hundreds of QSAs and ISAs globally to accurately automate the assessment of PCI DSS 4.0 network testing procedures.
PCI DSS 4.0 Use Case
PCI DSS 4.0 Use Case
Driving security from PCI DSS 4.0 compliance. Harnessing Nipper Enterprise to keep payments data safe - and secure the attack surface, beyond the CDE
NEW
Read More
PCI DSS 4.0 MITRE ATT&CK® Capability Statement
PCI DSS 4.0 MITRE ATT&CK® Capability Statement
Viewing and managing compliance through an attacker's lens and understand your exposure to real-world threats.
On-demand security & compliance assessments by Nipper
On-demand security & compliance assessments by Nipper
Close your most critical security and compliance gaps with Nipper. Find out how Nipper can help with on-demand network configuration assessments to assess zero trust readiness, ensure effective segmentation and evidence compliance.
NIST SP 53 Compliance Report Highlights
NIST SP 53 Compliance Report Highlights
A guide to the innovative features of Nipper's dedicated NIST SP 800-53 compliance report
Cybersecurity Glossary
Cybersecurity Glossary
This cybersecurity glossary is designed to provide a resource for understanding the essential terms and concepts in the field of cybersecurity.
PCI DSS Compliance Report Highlights
PCI DSS Compliance Report Highlights
A guide to the innovative new features in Nipper’s PCI DSS Compliance Report.
Leveraging NE data in SIEM to report on the top exploited vulnerabilities identified by CISA
Leveraging NE data in SIEM to report on the top exploited vulnerabilities identified by CISA
Organizations must be able to identify and report on which CVEs their network is exposed to (currently and historically) to carry out effective mitigation and remediation. Achieving this on an enterprise scale network presents numerous challenges.
On the radar: Nipper Enterprise
On the radar: Nipper Enterprise
“Nipper Enterprise adds a level of proactive security risk assessment and vulnerability management, which complements nicely the kind of server-centric vulnerability assessment enabled by the likes of Qualys and Tenable.” - Omdia
Validating network configurations is seen as a top three consideration for Commercial CNI network security teams.
Validating network configurations is seen as a top three consideration for Commercial CNI network security teams.
Latest research reveals the key challenges cybersecurity teams face when managing PCI DSS compliance.
State sponsored attacks exploit publicly known vulnerabilities. Early detection of such attacks is vital.
State sponsored attacks exploit publicly known vulnerabilities. Early detection of such attacks is vital.
Use Case: Identifying network compromise and prioritizing remediation
What is Zero Trust and how can it be achieved?
What is Zero Trust and how can it be achieved?
An introduction to Zero Trust for NOC and SOC teams
The impact of exploitable misconfigurations on network security within US Federal organizations
The impact of exploitable misconfigurations on network security within US Federal organizations
New Report Reveals U.S. Federal Government Exposed to Significant Cybersecurity Risks Due to Exploitable Network Misconfigurations
New Report Reveals Exploitable Network Misconfigurations Cost Organizations 9% of Total Annual Revenue
New Report Reveals Exploitable Network Misconfigurations Cost Organizations 9% of Total Annual Revenue
New Report Reveals Exploitable Network Misconfigurations Cost Organizations 9% of Total Annual Revenue
Impact of exploitable misconfigurations on network security
Impact of exploitable misconfigurations on network security
Infographic - Key highlights from the independent study into the impact of exploitable misconfigurations
CMMC changes – Don’t wait for the new rules to be implemented, start working on your NIST 800-171 compliance today
CMMC changes – Don’t wait for the new rules to be implemented, start working on your NIST 800-171 compliance today
Contractors shouldn’t wait until the end of the rule making process to work on their compliance for CMMC. Instead, they should start today, if they haven’t already.
Telcos - Under the cyber security spotlight
Telcos - Under the cyber security spotlight
Increased dependence on telcos meant increased risk for the sector. Telcos became more of a target for cyber attacks, with numerous costly data breaches being reported.
NIST releases update to guidance on managing cybersecurity in your supply chain
NIST releases update to guidance on managing cybersecurity in your supply chain
Earlier this month, a revised version of NIST SP 800-161 was released. The update provides federal agencies with the latest guidance on identifying, assessing, and responding to risks throughout the supply chain.
Department of Defense urges use of continuous Authorization To Operate (cATO)
Department of Defense urges use of continuous Authorization To Operate (cATO)
Memo provides guidance and explains the necessary competencies for enabling cATO
The transition to zero trust: How prepared are federal agencies?
The transition to zero trust: How prepared are federal agencies?
Memo released detailing zero trust requirements for federal agencies
Network segmentation is key to improving data security
Network segmentation is key to improving data security
When implemented correctly, a network segmentation strategy can effectively isolate attacks within the network to minimize harm.
The ripple effect of ransomware attacks: Kronos in chaos with millions affected
The ripple effect of ransomware attacks: Kronos in chaos with millions affected
There is a misconception that organizations that regularly backup their systems are immune from severe damage in the event of a cyberattack.
An update on the Apache Log4j vulnerability and Nipper
An update on the Apache Log4j vulnerability and Nipper
Titania confirms that neither Nipper nor Nipper Enterprise are susceptible to this vulnerability...
Establish Defendable Network & Automate RMF Compliance
Establish Defendable Network & Automate RMF Compliance
Combining continuous misconfiguration detection and auto-mitigation with risk-focused compliance analysis
Assess NIST SP 800-171 Compliance with Titania Nipper
Assess NIST SP 800-171 Compliance with Titania Nipper
Watch our on-demand webinar to learn how compliance with NIST 800-171 is assessed, and discover the new NIST 800-171 module for Titania Nipper which can save you time and resources.
Reducing MTTR vulnerabilities with accurate remediation guidance for routers, switches and firewalls
Reducing MTTR vulnerabilities with accurate remediation guidance for routers, switches and firewalls
Carrying out a vulnerability assessment is one of the first steps in establishing a more secure network.
Nipper’s risk prioritization compared to the Common Vulnerability Scoring System (CVSS)
Nipper’s risk prioritization compared to the Common Vulnerability Scoring System (CVSS)
The CVSS assesses the severity of vulnerabilities for individual devices, but what about the threat to the network.
Vulnerability Audits for Network Devices
Vulnerability Audits for Network Devices
Configuration audits of network devices are important to give visibility of the vulnerabilities within the network.
Establishing a baseline to combat configuration drift in your network
Establishing a baseline to combat configuration drift in your network
Keeping configurations up-to-date can be a major challenge due to configuration drift. Learn how to use Nipper to establish a baseline in order to mitigate against this.
NIST SP 800-171 Infographic
NIST SP 800-171 Infographic
Titania Nipper’s accurate auditing capability has been mapped to NIST 800-171 requirements.
FISMA Compliance Checklist - 7 Steps To Stay Compliant
FISMA Compliance Checklist - 7 Steps To Stay Compliant
Here is a 7-step checklist to stay in compliance with the core requirements of FISMA.
What is NIST SP 800-172? Requirements for Protecting CUI
What is NIST SP 800-172? Requirements for Protecting CUI
This guide explores NIST SP 800-172, the background to the framework, and its requirements.
NIST SP 800-53 Compliance Explained - How to be Compliant
NIST SP 800-53 Compliance Explained - How to be Compliant
This guide explores NIST SP 800-53, its controls and requirements, and tips to help organizations achieve and maintain compliance.
Assess CMMC Compliance with Titania Nipper
Assess CMMC Compliance with Titania Nipper
Watch our on-demand webinar to learn how compliance with the Cybersecurity Maturity Model Certification (CMMC) is assessed, and discover the new CMMC module for Titania Nipper which can save you time and resources.
CMMC Compliance Checklist
CMMC Compliance Checklist
This checklist helps contractors prepare for CMMC compliance and includes a point-by-point rundown of the 17 CMMC domains.
DISA STIG Compliance Explained
DISA STIG Compliance Explained
This guide explores DISA STIGs, what they consist of, and an overview of solutions that can help your organization achieve compliance.
How FISMA is helping protect federal IT networks
How FISMA is helping protect federal IT networks
FISMA requires federal agencies to manage their risks at or below specified acceptable levels in a cost-effective, timely and efficient manner.
Setting realistic expectations for preventing ransomware attacks
Setting realistic expectations for preventing ransomware attacks
In the aftermath of the recent high-profile ransomware attack on Colonial Pipeline, there are clear and tangible consequences that have been experienced by the general public.
What is FISMA Compliance? | FISMA Compliance Explained
What is FISMA Compliance? | FISMA Compliance Explained
The Federal Information Security Management Act (FISMA) was passed in 2002 and made it a requirement for federal agencies to implement cybersecurity programs to protect systems and information.
The Role of Cybersecurity Standards in Advancing Supply Chain Risk Management, with Dr Ron Ross
The Role of Cybersecurity Standards in Advancing Supply Chain Risk Management, with Dr Ron Ross
Panel discussion with Dr. Ron Ross, John Weiler and Matt Malarkey from the CMMC Center of Excellence and Titania CEO, Phil Lewis.
What Is CMMC? Cybersecurity Maturity Model Certification
What Is CMMC? Cybersecurity Maturity Model Certification
The CMMC is a framework of standards for cybersecurity implementation designed to increase resilience against cyber-attacks throughout the DIB. This guide explores the CMMC and the process for certification.
Nipper 2.10 extends support up to PAN-OS 9.1
Nipper 2.10 extends support up to PAN-OS 9.1
The latest release of Titania Nipper extends support up to PAN-OS 9 and 9.1, providing richer reports and assured accuracy for users auditing Palo Alto firewalls.
How the Transport Industry use Titania Nipper
How the Transport Industry use Titania Nipper
Join our webinar to discover how this International airport used Titania Nipper to review and bolster it's cybersecurity by auditing firewalls, switches and routers and identifying fixes to ensure security and compliance.
What is NIST SP 800-171? How to Stay Compliant in 2021
What is NIST SP 800-171? How to Stay Compliant in 2021
This guide explores NIST SP 800-171, what it consists of, and the steps to become compliant with it.
Firewall Management: The Expert Guide
Firewall Management: The Expert Guide
This guide aims to simplify the topic of firewall management, highlighting best practice processes and procedures for organizations of all sizes.
Latest release of Nipper delivers further time savings on Cisco ASA device audits
Latest release of Nipper delivers further time savings on Cisco ASA device audits
Nipper 2.9.1 focuses on enhancements to the Cisco PSIRT plugin and improvements in accuracy, stability and usability across several other report plugins and devices.
NIST SP 800-171 Plan of Action - What Tools Can I Use to Write My Plan of Action?
NIST SP 800-171 Plan of Action - What Tools Can I Use to Write My Plan of Action?
Compliance with NIST SP 800-171 is a contractual obligation for organizations that process Controlled Unclassified Information (CUI) on behalf of the US government.
How can I quickly and accurately assess SPRS points for network devices?
How can I quickly and accurately assess SPRS points for network devices?
The National Institute of Standards and Technology’s Special Publication 800-171 (NIST SP 800-171) is a framework of cybersecurity controls designed to safeguard Controlled Unclassified Information (CUI) in non-federal networks.
How can I evidence compliance with NIST SP 800-171?
How can I evidence compliance with NIST SP 800-171?
Any organization that processes or stores Controlled Unclassified Information (CUI) for government agencies must be compliant with NIST 800-171.
International Airport Case Study
International Airport Case Study
International Airport turns to Titania Nipper to ensure cybersecurity compliance and protect their complex network
Titania Nipper 2.9.0 released
Titania Nipper 2.9.0 released
The latest release of Titania Nipper offers enhanced accuracy for customers.
DFARS rule change includes more than just a CMMC requirement
DFARS rule change includes more than just a CMMC requirement
The Department of Defense’s (DoD) new cybersecurity standard for contractors – Cybersecurity Maturity Model Certification (CMMC) – cleared two significant steps at the end of September 2020
How Financial Institutions use Titania Nipper
How Financial Institutions use Titania Nipper
With financial gain continuing to be the top motive for cyber-attacks it’s no surprise that financial & banking institutions are continually at risk of cyber-attacks. Join our webinar to learn how to use Titania Nipper to manage your network risks.
Financial Services International Bank Case Study
Financial Services International Bank Case Study
In 2017, this International Bank decided to undertake a review of its systems and processes.
DHS CDM Program Faces Vulnerabilities & Insecure
DHS CDM Program Faces Vulnerabilities & Insecure
The CDM program leverages automated tools to assess configurations and identify potential vulnerabilities residing on agency networks.
First Cohort of CMMC Assessors Begin Training
First Cohort of CMMC Assessors Begin Training
Last week, the first group of Cybersecurity Maturity Model Certification (CMMC) assessors began their training.
Titania Nipper named Cyber Defence Product of the Year
Titania Nipper named Cyber Defence Product of the Year
We’re proud to announce that Titania took home the Cyber Defence Product of the Year award at the 2020 National Cyber Awards for our leading vulnerability auditing software, Titania Nipper.
Compliance in a Connected World
Compliance in a Connected World
Kirsty Fisher, CFO at Titania explains how hackers exploiting the so-called ‘Internet of Things’.
‘The Pen Ten’ – 10 types of pen testing tools needed to assess security in 2020
‘The Pen Ten’ – 10 types of pen testing tools needed to assess security in 2020
While many organizations have vulnerability assessment tools in place to identify weaknesses in the network and keep on top of security, penetration testing (or pen testing) provides a nuts and bolts approach to cybersecurity.
Vulnerability scanners vs configuration auditing software
Vulnerability scanners vs configuration auditing software
Both are important when it comes to assessing and maintaining cybersecurity and many of the accepted industry standards require both as mandatory.
Titania Participates Alongside DoD, DreamPort in CREST USA Webinar on CMMC
Titania Participates Alongside DoD, DreamPort in CREST USA Webinar on CMMC
Phil Lewis, Titania COO, took part in the recent webinar hosted by CREST USA on the US DoD’s new Cybersecurity Maturity Model Certification program.
Vulnerability reporting against Cisco Devices with Nipper
Vulnerability reporting against Cisco Devices with Nipper
Technical brief
Download the latest update of Titania Nipper Version 2.8.0 with Check Point Auditing
Download the latest update of Titania Nipper Version 2.8.0 with Check Point Auditing
This latest software release includes enhanced Check Point Auditing
Crest CMMC Webinar: Overview, Updates and Opportunities
Crest CMMC Webinar: Overview, Updates and Opportunities
Join COO, Phil Lewis, and other key CMMC stakeholders for an introduction and overview of the US Cybersecurity Maturity Model Certification (CMMC).
Accurately audit network device compliance with the new CMMC framework
Accurately audit network device compliance with the new CMMC framework
How Titania Nipper can help you comply with the CMMC Framework
PCI firewall basics – all you need to know
PCI firewall basics – all you need to know
Get started on your PCI DSS compliance journey with our firewall basics
Cyber skills shortage – the true threat to safeguarding your business
Cyber skills shortage – the true threat to safeguarding your business
What impact is this having on cybersecurity as a whole, and how can this challenge be tackled?
What types of cyberattacks are on the rise?
What types of cyberattacks are on the rise?
Keith Driver discusses the increase in cyberattacks and what organizations can do to strengthen their defenses.
RMF for DoD contractors | 7 Steps for RMF Compliance
RMF for DoD contractors | 7 Steps for RMF Compliance
The Risk Management Framework (RMF) provides guidelines for taking a risk-based approach to information system security and privacy for federal agencies, related contractors and subcontractors.
DoD Supply Chain Cyber Security – Trust, and Now Verify
DoD Supply Chain Cyber Security – Trust, and Now Verify
DoD officials frequently cite the enormous cost of cyber breaches on the US economy and the national security implications of IP theft from the US defense industrial base (DIB)
NIST SP 800-53 Mapping Document
NIST SP 800-53 Mapping Document
Accurately automate the assessment of NIST 800-53 network controls.pci m
NIST 800-171 Mapping Document
NIST 800-171 Mapping Document
Accurately automate the assessment of NIST 800-171 network requirements
Are you PCI DSS Compliant?
Are you PCI DSS Compliant?
Find out why you need to be PCI DSS Compliant in our Infographic download
Why Vulnerability Assessments are more important than ever...
Why Vulnerability Assessments are more important than ever...
The current environment creates the perfect storm for cyber breaches. The need for organizations to assess the vulnerability of their networks and devices to protect valuable business data has never been greater.
CMMC Mapping Document
CMMC Mapping Document
Information on the CMMC network security practices that can be audited using Nipper
Maintaining PCI Compliance remotely
Maintaining PCI Compliance remotely
With the number of businesses working remotely during the coronavirus outbreak continuing to rise, it has opened up even more potential challenges for those handling sensitive customer payment card data.
Nipper CLI Guide
Nipper CLI Guide
This guide provides assistance with the usage of Nipper when using Command Prompt (Windows) or Terminal (Linux)
Pentest Automation Solution Infographic
Pentest Automation Solution Infographic
Infographic explaining the technology behind Titania Nipper
Remote working, consumer spend and vulnerable networks: staying PCI DSS compliant during COVID-19
Remote working, consumer spend and vulnerable networks: staying PCI DSS compliant during COVID-19
Remote working, consumer spend and vulnerable networks: staying PCI DSS compliant during COVID-19
How can SOCs achieve Configuration Confidence?
How can SOCs achieve Configuration Confidence?
The SOC still needs to ensure that the foundational cyber hygiene is in place, which prevents over 90% of intrusions, but how does a SOC demonstrate this to business leaders?
Titania Nipper - PCI DSS Audit Overview
Titania Nipper - PCI DSS Audit Overview
Taking just minutes to set up, clients save 3 hours of auditing per device - automating their most critical PCI DSS checks with Nipper, Titania's market leading configuration and build review tool.
Stay compliant with these 12 high level PCI requirements
Stay compliant with these 12 high level PCI requirements
Over the last twenty years the number of data breaches reported in the United States alone has risen steadily, from 614 data breaches reported in 2013 to 1,579 reported in 2017.