Blog

Vulnerability Research

Critical Vulnerability Found in Avaya AES Management Console

Vulnerability Identified in the Avaya AES Management Console PlatformToday Digital Defense is publishing a high impact zero-day vulnerability identified in the Avaya Application Enablement Services (AES) Management Console platform discovered by Digital Defense Security Analysts. The Digital Defense Vulnerability Research Team would like to commend Avaya for their prompt handling and diligent...
Blog

10 Essential Tips for Securing FTP and SFTP Servers

Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers. Learn SFTP security best practices in this blog and webinar.
Blog

Zero-Day Alert: Four Vulnerabilities Discovered in Riverbed Technology Performance Monitoring Platform Discovered by Digital Defense, Inc.

Digital Defense is publishing multiple application vulnerabilities in the Riverbed SteelCentral portal application today following the client notification by Riverbed Technology. Digital Defense’s Vulnerability Research Team identified the security issues through vulnerability scanning, and brought the flaws to the attention of Riverbed Technology in January 2017 following discovery. Riverbed...
Blog

eBay Breach Highlights the Value of Monitoring Security-Related Events

The importance of monitoring your computer system and personal information simply cannot be overstated. In today's online environment, hackers hungry for users' account information and other sensitive details seem to be lurking around every corner. To keep these attackers at bay, companies must always have an eye on system and account activity, and be able to react quickly should anything...
Blog

Database Transaction Log Management

Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.
Blog

How DR Compliance Requirements Impact HA Decisions

Disaster recovery requirements are part of the geographic and industry regulations that affect our organizations. Having the right solutions in place can help to avoid penalties and make audits go smoothly. Read on to create a complete compliance toolkit.