We're sorry, the page you were looking for appears to no longer exist, or has been moved.
Companies and individuals who would like to reduce the risk of a social media compromise can download DDI’s free “Social Butterfly” Guide. CLICK HERE to download and learn more about heightening security when engaging through social media.
Leading Law Firm Leverages Managed Service to Bolster Security
The security industry is befuddled with vague, conflicting, and incorrect statements regarding vulnerability assessments and penetration tests. This paper explains the elements of a vulnerability assessment and those of a penetration test, describes the differences between the two activities and shows how these two activities are typically related within an ongoing security program.
In this report, Mike Cotton, Vice President, Research and Development and the Digital Defense, Inc. Vulnerability Research Team provide intelligence on the state of security and the top five critical issues affecting servers, and offer recommendations and Decisive Security Intelligence to mitigate risk and bolster security.
TruMark Federal Credit Union turned to Digital Defense, Inc. (DDI) assistance for their penetration testing needs. The credit union appreciated that DDI has tenured security analysts who have real world experience in testing a variety of platforms and advised their clients on industry standard practices to eliminate or reduce the risk of discovered issues.
Author: Michael Cotton, CISSP, Chief Network Security Architect, Vulnerability Research, Digital Defense, Inc.
Learn about some common methods used by hackers during targeted network attacks and some steps you should take to combat them.
Social engineering is a successful way cyber criminals are infiltrating organizations. Through email, phone, online platforms such as social media and physical infiltration tactics, attackers are using manipulative techniques designed to prey on the weaknesses of basic human nature. CLICK HERE to download the Social Engineering Prevention Guide
Security breaches and hacking occurrences are happening at alarming rates to businesses of all sizes, damaging reputations and exhausting resources. At Digital Defense, we understand today's dangers and take a holistic approach to information security by providing solutions in the areas of security risk assessments, awareness education and Decisive Security Intelligence.
In this webinar, Mike Cotton, Digital Defense Chief Technology Architect, discusses Targeted Network Attacks specific to the legal industry.
To view the recording please visit: https://www3.gotomeeting.com/register/162245558
*Visitors may need to enter email address and register to access the recording.
Law Firms around the country are anxious to determine the overall effectiveness of their information security programs and to understand if their practices are aligned with industry peers.
Please listen in as Meg Grant, Vice President, Marketing at Digital Defense and a LegalSec Vendor Advisory Team member reviews the results of the LegalSec Report, A Study of the Legal Industry’s Information Security Assessment Practices. The report, published in August and released at ILTA Annual conference, provides un-biased and relevant knowledge surrounding information security programs and practices within North American law firms.
Grant will highlight key findings and provide context surrounding all the results.
To listen to the podcast, please CLICK HERE.
07/26/2015 » CVE-2015-3227
The (1) jdom.rb and (2) rexml.rb components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth. [READ ME]