Blog

Blog

Debunking the Fake News Surrounding IBM i Security

Many IT pros have been misled about IBM i security or are making assumptions about features of the platform that were once true but aren’t any longer. This article addresses some common misconceptions.
Blog

Equifax’s Problem and How to Avoid It

Recently, the cause of Equifax’s catastrophic cyber attack was revealed as a hack that exploited a known bug in in Equifax’s web application software, Apache Struts.Since then, the discourse surrounding the event has shifted to two main subjects:The blame game: people want to hold someone responsible. The fallout has claimed the jobs of Equifax’s CSO, CIO, and now, CEO.The preventability of the...
Blog

How to Get Started with NIST 800-171 Compliance

Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
Blog

Five Causes of Performance Bottlenecks in IT

As IT infrastructures continue to grow more complex, finding performance bottlenecks gets hard. That’s why it’s absolutely essential that IT teams have the tools, training, and resources necessary to quickly identify causes of poor application performance.
Blog

Network Monitoring Tips for Hybrid IT Environments

Hybrid IT allows organizations to experiment with the cloud while keeping any equipment or applications on-premises as it makes sense. If you’re the one responsible for day-to-day monitoring, here’s what you need to know to manage the complexity.
Vulnerability Research

Critical Vulnerability Found in Avaya AES Management Console

Vulnerability Identified in the Avaya AES Management Console PlatformToday Digital Defense is publishing a high impact zero-day vulnerability identified in the Avaya Application Enablement Services (AES) Management Console platform discovered by Digital Defense Security Analysts. The Digital Defense Vulnerability Research Team would like to commend Avaya for their prompt handling and diligent...
Blog

10 Essential Tips for Securing FTP and SFTP Servers

Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers. Learn SFTP security best practices in this blog and webinar.
Blog

Zero-Day Alert: Four Vulnerabilities Discovered in Riverbed Technology Performance Monitoring Platform Discovered by Digital Defense, Inc.

Digital Defense is publishing multiple application vulnerabilities in the Riverbed SteelCentral portal application today following the client notification by Riverbed Technology. Digital Defense’s Vulnerability Research Team identified the security issues through vulnerability scanning, and brought the flaws to the attention of Riverbed Technology in January 2017 following discovery. Riverbed...