Blog

Blog

The Third Party Data Breach Problem

Data breaches via third parties are a growing problem impacting companies across many industries – and one that can be even more difficult to defend against. How can companies secure their assets against cyber attacks that target suppliers and partners or use information stolen in previous breaches?
Blog

Six considerations for mitigating risk in IoT devices

IoT has already developed a reputation for poor security. As connected devices become more engrained in our day to day business and personal lives, producers of IoT technology should follow these six tips to shore up IoT security.
Blog

What Is Queuing Theory?

Queuing theory is the study of queues, otherwise known as waiting lines. It sounds straightforward. But unless you have an advanced math degree, queuing theory can be difficult to understand. That’s why we’re clarifying queuing theory basics.
Blog

What is FTP Security? Securing FTP Usage

File Transfer Protocol is widely used in corporate networks yet has inherent data security risks. Here’s an overview of some of the challenges of FTP security and methods to address them.
Vulnerability Research

Finding the Solarwinds Flaw

Several months back I was updating our vulnerability scanner checks for various Solarwinds products. As I added a detection script for a product called Log and Event Manager (LEM), I realized that there were really no significant publicly disclosed vulnerabilities for it. This spurred me to download their trial, which comes as a virtual appliance, and look for some flaws. After initially setting...
Vulnerability Research

DDIVRT-2015-55 SolarWinds Log and Event Manager Remote Command Execution

Title: DDIVRT-2015-55 SolarWinds Log and Event Manager Remote Command ExecutionSeverity: HighDate Discovered: August 15, 2015Discovered By: Chris Graham @cgrahamsevenVulnerability Description:SolarWinds Log and Event Manager (LEM) is vulnerable to an Extensible Markup Language (XML) external entity injection through the agent message processing service. This service listens on TCP port 37891....
Blog

What Is File Fingerprinting?

File fingerprinting, also known as data fingerprinting or document fingerprinting, is a technique employed by many network data loss prevention solutions for identifying and tracking data across a network. Read on to learn more about fingerprinting and the security benefits of a DLP solution with data fingerprinting capabilities.
Blog

What Is Content Inspection?

Get a definition of content inspection and learn how content inspection technology plays a key role in data loss prevention and regulatory compliance.
Blog

The Long Goodbye to SSL/Early TLS

If your organization is required to comply with the Payment Card Industry-Data Security Standard (PCI-DSS), particularly Requirement 11, then you are likely familiar with the problems plaguing SSL, early TLS (i.e. TLSv1.0) and their supported ciphers over the past several months. High profile vulnerabilities such as HeartBleed, POODLE, FREAK and LogJam have sent merchants scrambling to patch...