Decisive Security IntelligenceDecisive Security Intelligence We Don't Stumble Upon Threats, We Seek Them Out.
Sec_Intel_100512.png

With information security breaches on the rise and new vulnerabilities developing every day, it is imperative that organizations are adequately informed to defend against these threats. 

While technology is an important element to detecting vulnerabilities, having a vigilant and responsive team of security experts is a unique benefit offered by DDI.  Our dedicated Vulnerability Research Team (VRT) and certified Security Analysts are thought leaders in the information security industry.  Through our Decisive Security Intelligence, you can be properly armed to defend against potential threats that could impact the security of your organization.

Our Decisive Security Intelligence is delivered in multiple ways:

  • Big Data Analysis - Our VRT utilizes Big Data analysis to further reinforce your security by mining aggregate data and identifying potential threats to the DDI community of clients and beyond.  Acting on this valuable information, clients can respond quickly to thwart potential security breaches. 
  • DDI Insight™ - An annual, benchmark study, offered exclusively through DDI, Insight allows you a keen perspective to inform your initiatives surrounding information security.
  • Managed Service Solutions - DDI’s managed solutions come with an assigned Personal Security Analyst (PSA).  Unlike other tool providers, our PSAs offer the industry expertise to guide your assessment and remediation efforts and we will be with you every step of the way as you develop strategies to ensure your valuable data is safeguarded.

So, what can Decisive Security Intelligence mean to you? If you are a DDI client, you can rest assured you will receive the highest and most current intelligence available to arm yourself against the ever-changing threats to your organization’s security.

Alert Center

04/24/2014 » CVE-2014-2391
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potentially useful password-pattern information by reading (1) a web-server access log, (2) a web-server Referer log, or (3) browser history that contains this string because of its presence in a GET request. [READ ME]

Visit DDI Alert Center