“Social Butterfly” Guide to Help Companies And Employees Mitigate the Risks of Social Networking

Companies and individuals who would like to reduce the risk of a social media compromise can download DDI’s free “Social Butterfly” Guide. CLICK HERE to download and learn more about heightening security when engaging through social media.

  • Web Application Penetration Testing
    Vulnerability Scanning Solutions
  • Vulnerability Management Case Study: Keesal Young & Logan

    Leading Law Firm Leverages Managed Service to Bolster Security

  • Vulnerability Lifecycle Management - Professional
  • Vulnerability Assessment vs. Penetration Testing
    Author: Brandon Shilling, CISSP, Director, Vulnerability Research, Digital Defense, Inc.

    January 2011

    The security industry is befuddled with vague, conflicting, and incorrect statements regarding vulnerability assessments and penetration tests. This paper explains the elements of a vulnerability assessment and those of a penetration test, describes the differences between the two activities and shows how these two activities are typically related within an ongoing security program.

  • Training Education Awareness Module (TEAM)
  • Top Five Critical Issues Affecting Servers

    In this report, Mike Cotton, Vice President, Research and Development and the Digital Defense, Inc. Vulnerability Research Team provide intelligence on the state of security and the top five critical issues affecting servers, and offer recommendations and Decisive Security Intelligence to mitigate risk and bolster security.

    The Need for Penetration Testing

    2009 

    TruMark Federal Credit Union turned to Digital Defense, Inc. (DDI) assistance for their penetration testing needs. The credit union appreciated that DDI has tenured security analysts who have real world experience in testing a variety of platforms and advised their clients on industry standard practices to eliminate or reduce the risk of discovered issues.

    Targeted Network Attacks

    Author:  Michael Cotton, CISSP, Chief Network Security Architect, Vulnerability Research, Digital Defense, Inc.
    June 2011 

    Learn about some common methods used by hackers during targeted network attacks and some steps you should take to combat them.

    Social Media Dangers: What Every 'Social Butterfly' Should Know
    Social Engineering Prevention Guide

    Social engineering is a successful way cyber criminals are infiltrating organizations. Through email, phone, online platforms such as social media and physical infiltration tactics, attackers are using manipulative techniques designed to prey on the weaknesses of basic human nature. CLICK HERE to download the Social Engineering Prevention Guide

    Security Awareness Case Study- People First Federal Credit Union

    Digital Defense Helps Build a Culture of Security through Innovative Security Training.

  • Remediation Manager-Professional
    Physical Site Review
    PCI-Professional
  • Network Host Reconciliation
    LegalSEC Webinar Series: Targeted Network Attacks

    Security breaches and hacking occurrences are happening at alarming rates to businesses of all sizes, damaging reputations and exhausting resources. At Digital Defense, we understand today's dangers and take a holistic approach to information security by providing solutions in the areas of security risk assessments, awareness education and Decisive Security Intelligence. 

    In this webinar, Mike Cotton, Digital Defense Chief Technology Architect, discusses Targeted Network Attacks specific to the legal industry. 

    To view the recording please visit: https://www3.gotomeeting.com/register/162245558

    *Visitors may need to enter email address and register to access the recording. 

    LegalSEC Industry Perspective Podcast

    Law Firms around the country are anxious to determine the overall effectiveness of their information security programs and to understand if their practices are aligned with industry peers.

    Please listen in as Meg Grant, Vice President, Marketing at Digital Defense and a LegalSec Vendor Advisory Team member reviews the results of the LegalSec Report,  A Study of the Legal Industry’s Information Security Assessment Practices. The report, published in August and released at ILTA Annual conference,  provides un-biased and relevant knowledge surrounding information security programs and  practices within  North American law firms.

    Grant will highlight key findings and provide context surrounding all the results.

    To listen to the podcast, please CLICK HERE.

We're sorry, the page you were looking for appears to no longer exist, or has been moved.

Alert Center

08/03/2015 » CVE-2015-5600
The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list. [READ ME]

Visit DDI Alert Center