We're sorry, the page you were looking for appears to no longer exist, or has been moved.
Companies and individuals who would like to reduce the risk of a social media compromise can download DDI’s free “Social Butterfly” Guide. CLICK HERE to download and learn more about heightening security when engaging through social media.
Leading Law Firm Leverages Managed Service to Bolster Security
The security industry is befuddled with vague, conflicting, and incorrect statements regarding vulnerability assessments and penetration tests. This paper explains the elements of a vulnerability assessment and those of a penetration test, describes the differences between the two activities and shows how these two activities are typically related within an ongoing security program.
In this report, Mike Cotton, Vice President, Research and Development and the Digital Defense, Inc. Vulnerability Research Team provide intelligence on the state of security and the top five critical issues affecting servers, and offer recommendations and Decisive Security Intelligence to mitigate risk and bolster security.
TruMark Federal Credit Union turned to Digital Defense, Inc. (DDI) assistance for their penetration testing needs. The credit union appreciated that DDI has tenured security analysts who have real world experience in testing a variety of platforms and advised their clients on industry standard practices to eliminate or reduce the risk of discovered issues.
Author: Michael Cotton, CISSP, Chief Network Security Architect, Vulnerability Research, Digital Defense, Inc.
Learn about some common methods used by hackers during targeted network attacks and some steps you should take to combat them.
Social engineering is a successful way cyber criminals are infiltrating organizations. Through email, phone, online platforms such as social media and physical infiltration tactics, attackers are using manipulative techniques designed to prey on the weaknesses of basic human nature. CLICK HERE to download the Social Engineering Prevention Guide
Learn about two types of vulnerability management deliveries, cloud-based and premised-based. Challenges with vulnerability management are discussed and differences and advantages between cloud-based vulnerability management delivery and premise-based solutions are addressed.
Security breaches and hacking occurrences are happening at alarming rates to businesses of all sizes, damaging reputations and exhausting resources. At Digital Defense, we understand today's dangers and take a holistic approach to information security by providing solutions in the areas of security risk assessments, awareness education and Decisive Security Intelligence.
In this webinar, Mike Cotton, Digital Defense Chief Technology Architect, discusses Targeted Network Attacks specific to the legal industry.
To view the recording please visit: https://www3.gotomeeting.com/register/162245558
*Visitors may need to enter email address and register to access the recording.
05/26/2015 » CVE-2015-1013
OSIsoft PI AF 2.6 and 2.7 and PI SQL for AF 188.8.131.52 do not ensure that the PI SQL (AF) Trusted Users group lacks the Everyone account, which allows remote authenticated users to bypass intended command restrictions via SQL statements. [READ ME]