“Social Butterfly” Guide to Help Companies And Employees Mitigate the Risks of Social Networking

Companies and individuals who would like to reduce the risk of a social media compromise can download DDI’s free “Social Butterfly” Guide. CLICK HERE to download and learn more about heightening security when engaging through social media.

  • Web Application Penetration Testing
    Vulnerability Scanning Solutions
  • Vulnerability Management Case Study: Keesal Young & Logan

    Leading Law Firm Leverages Managed Service to Bolster Security

  • Vulnerability Lifecycle Management - Professional
  • Vulnerability Assessment vs. Penetration Testing
    Author: Brandon Shilling, CISSP, Director, Vulnerability Research, Digital Defense, Inc.

    January 2011

    The security industry is befuddled with vague, conflicting, and incorrect statements regarding vulnerability assessments and penetration tests. This paper explains the elements of a vulnerability assessment and those of a penetration test, describes the differences between the two activities and shows how these two activities are typically related within an ongoing security program.

  • Training Education Awareness Module (TEAM)
  • Top Five Critical Issues Affecting Servers

    In this report, Mike Cotton, Vice President, Research and Development and the Digital Defense, Inc. Vulnerability Research Team provide intelligence on the state of security and the top five critical issues affecting servers, and offer recommendations and Decisive Security Intelligence to mitigate risk and bolster security.

    The Need for Penetration Testing

    2009 

    TruMark Federal Credit Union turned to Digital Defense, Inc. (DDI) assistance for their penetration testing needs. The credit union appreciated that DDI has tenured security analysts who have real world experience in testing a variety of platforms and advised their clients on industry standard practices to eliminate or reduce the risk of discovered issues.

    Targeted Network Attacks

    Author:  Michael Cotton, CISSP, Chief Network Security Architect, Vulnerability Research, Digital Defense, Inc.
    June 2011 

    Learn about some common methods used by hackers during targeted network attacks and some steps you should take to combat them.

    Social Media Dangers: What Every 'Social Butterfly' Should Know
    Social Engineering Prevention Guide

    Social engineering is a successful way cyber criminals are infiltrating organizations. Through email, phone, online platforms such as social media and physical infiltration tactics, attackers are using manipulative techniques designed to prey on the weaknesses of basic human nature. CLICK HERE to download the Social Engineering Prevention Guide

    Security Awareness Case Study- People First Federal Credit Union

    Digital Defense Helps Build a Culture of Security through Innovative Security Training.

  • Remediation Manager-Professional
  • Realizing the Benefits of Vulnerability Management in the Cloud
    Author: Gordon MacKay, CISSP, Chief Technology Officer, Digital Defense, Inc.

    April 2011

    Learn about two types of vulnerability management deliveries, cloud-based and premised-based. Challenges with vulnerability management are discussed and differences and advantages between cloud-based vulnerability management delivery and premise-based solutions are addressed.

  • Physical Site Review
    PCI-Professional
  • Network Host Reconciliation
    LegalSEC Webinar Series: Targeted Network Attacks

    Security breaches and hacking occurrences are happening at alarming rates to businesses of all sizes, damaging reputations and exhausting resources. At Digital Defense, we understand today's dangers and take a holistic approach to information security by providing solutions in the areas of security risk assessments, awareness education and Decisive Security Intelligence. 

    In this webinar, Mike Cotton, Digital Defense Chief Technology Architect, discusses Targeted Network Attacks specific to the legal industry. 

    To view the recording please visit: https://www3.gotomeeting.com/register/162245558

    *Visitors may need to enter email address and register to access the recording. 

We're sorry, the page you were looking for appears to no longer exist, or has been moved.

Alert Center

05/21/2015 » CVE-2015-3036
Stack-based buffer overflow in the run_init_sbus function in the KCodes NetUSB module for the Linux kernel, as used in certain NETGEAR products, TP-LINK products, and other products, allows remote attackers to execute arbitrary code by providing a long computer name in a session on TCP port 20005. [READ ME]

Visit DDI Alert Center