Blog

Blog

Security Testing the Internet of Things: Dynamic testing (Fuzzing) for IoT security

What is the Internet of Things (IoT)?The Internet of Things (IoT) encompasses any and all products that are connected to the internet or to each other. Any product which requires connection to a home, car or office network to deliver its complete set of features falls under this broad term. In fact cars themselves are now a component of the IoT as they now exchange data with the manufacturer...
Blog

Employ Active Network Scanning to Eliminate High Risk Vulnerabilities

Keeping up with new vulnerability discoveriesWith hundreds of new vulnerabilities announced each month, active network scanning is essential. An automated, frequently used vulnerability assessment and management solution is your best option for the elimination of corporate network vulnerabilities.Enterprise now needs proactive, routine network scanning to keep up with internal changes and external...
Blog

Do You Collect Personal Data in Europe? GDPR Applies!

Calculating the cost of GDPR complianceThe EU General Data Protection Regulation (GDPR) is unique in the field of compliance standards for its establishment of financial penalties for the loss or mismanagement of personal data of EU citizens. And those fines are higher and more likely to be assessed than any existing standard. Any company that does business with EU citizens (or controls or...
Blog

Penetration Testing Tools You Can Use

Pen testing always includes a vulnerability assessmentPenetration testing is all about identifying network security weaknesses before they are exploited internally or externally. The best pen testers bring a range of tools and experience to each gig and a key tool they will use is vulnerability assessment.The experience level, tools used, findings and the report you get from each penetration test...
Blog

A SIEM that Speaks IBM i

Organizations of all sizes can benefit from capturing, logging, and responding to security events in real time, but one important operating system is often overlooked: IBM i.
Blog

GDPR Playbook

It’s time to play hardball – Fight and win the GDPR battle with a leader, plan and rock star team.Yes. We know GDPR is here. Can we talk about something else now?Nope, not if you haven’t done all your due diligence to implement best practices and comply. Ignorance has been bliss but it’s not an excuse post May 25, 2018.We’ve already seen GDPR come down with hard on day 1 of its enforcement with...
Vulnerability Research

ManageEngine Disclosure #3

Our research team is disclosing vulnerabilities identified in ManageEngine’s ADSelfService Plus application. ManageEngine was prompt in responding to the identified flaws and providing fixes for these security issues.A patched version of ADSelfService Plus can be downloaded from the ManageEngine site at: https://www.manageengine.com/products/self-service-password/download.htmlClients who currently...
Blog

How to Do Cloud Capacity Planning

Operating in the cloud can have some great benefits compared to operating with on-premises software. That’s why surveyed IT professionals predict 83% of enterprise workloads will be in the cloud by the year 2020.
Vulnerability Research

ManageEngine Disclosure #2

We disclosed multiple additional vulnerabilities identified on various ManageEngine applications. We commend ManageEngine for their prompt response to the identified flaws and their engineering team’s work with VRT to provide fixes for these cyber security issues.ManageEngine has provided patches for each of the vulnerabilities identified on the applications. The patched applications can be...
Vulnerability Research

ManageEngine

Update March 21, 2018: Added additional vulnerabilities disclosed to ManageEngine that were excluded from the original blog post affecting several additional ManageEngine applications.Multiple vulnerabilities have been identified on various ManageEngine applications discovered by our Vulnerability Research Team (VRT). We commend ManageEngine for their prompt response to the identified flaws and...
Blog

What is a Capacity Management Maturity Model?

Demands for services are increasing. High performance and reliability are expected. Yet budgets, labor and floor space are all being constrained. That’s where capacity management comes in. Capacity management can improve efficiency and guarantee reliability of your business systems.
Vulnerability Research

Avamar Zero-Day

Today Digital Defense is disclosing three vulnerabilities identified on Dell EMC Data Protection Suite Family products discovered by the Digital Defense Vulnerability Research Team (VRT). VRT would like to commend Dell EMC for their prompt handling and diligent attention to the issues and their work with Digital Defense engineering staff to understand, resolve and verify the fixes for these...
Blog

Equifax’s Problem and How to Avoid It

Recently, the cause of Equifax’s catastrophic cyber attack was revealed as a hack that exploited a known bug in in Equifax’s web application software, Apache Struts.Since then, the discourse surrounding the event has shifted to two main subjects:The blame game: people want to hold someone responsible. The fallout has claimed the jobs of Equifax’s CSO, CIO, and now, CEO.The preventability of the...
Blog

How to Get Started with NIST 800-171 Compliance

Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.