Blog
Effective Change Management: How to Prepare For Network Changes
By Kevin Jackson on Wed, 11/30/2016
With any change to the network infrastructure, you must maintain the ability to oversee and monitor the state of the network. Learn how a network monitoring tool like Intermapper can help you prepare for future network changes.
Blog
What are Indicators of Compromise?
By Cybersecurity Experts at Fortra on Mon, 11/21/2016
Learn about indicators of compromise and their role in detection and response in Data Protection 101, our series on the fundamentals of information security.
Blog
The Building Blocks of Threat Hunting: Understanding Cyber Threats and the Threat Lifecycle
By Tim Bandos on Tue, 11/15/2016
Threat hunting is emerging as a critical focal area for security teams today, yet many are new to this practice and don’t know where to start. Our new series outlines the fundamentals of threat hunting and gives tips on how to implement a threat hunting program at your organization.
Blog
Keep Calm and Be Prepared: Building an Effective Incident Response Plan (Infographic)
Mon, 11/07/2016
Incident response is more important than ever - check out our latest infographic for tips on developing the right incident response plan for your organization.
Blog
Supply Chain Cybersecurity: Experts on How to Mitigate Third Party Risk
By Cybersecurity Experts at Fortra on Tue, 11/01/2016
23 information security experts provide tips for securing data across business partners, suppliers, and other third parties.
Blog
Detecting a Rubber Ducky USB Attack with Digital Guardian Advanced Threat Protection (Video Demo)
Tue, 10/25/2016
Our latest video demonstrates how Digital Guardian Advanced Threat Protection can detect and block a Rubber Ducky USB attack.
Blog
How Much Should I Budget For Network Monitoring Software?
By Kevin Jackson on Tue, 10/25/2016
Create a realistic budget item for a network monitoring solution that will meet your needs (and won’t eat up all your IT funds).
Vulnerability Research
Zero Day Threats Found in Enterprise Application
Tue, 10/18/2016
Two zero-day vulnerabilities found in the Lexmark Markvision Enterprise application that our Vulnerability Research Team discovered and brought to the attention of Lexmark. Lexmark has worked diligently with Fortra to understand, resolve and verify the fixes for these security issues. Lexmark has released fixes. To obtain Markvision Enterprise v2.4.1 visit: https://www.lexmark.com/markvision...
Blog
Learning from a Security Incident: A Post-Mortem Checklist
By Cybersecurity Experts at Fortra on Tue, 10/18/2016
Our Field Guide to Incident Response series concludes with a post-incident checklist you can use to make sure you’re learning from every incident and improving your defenses against future attacks.
Vulnerability Research
Zero-Day Alert: Email Security Platform Details
Tue, 10/11/2016
Vendor: DellProduct: SonicWALL Email Security (virtual appliance)Version: 8.3.0.6149
Summary Information:SonicWALL Email Security can be configured as a Mail Transfer Agent (MTA) or SMTP proxy and has spam protection, compliance scanning, anti-malware and anti-virus capabilities. The affected web interfaces for these vulnerabilities are frequently available on externally accessible perimeter...
Vulnerability Research
Vulnerabilities Found in the Dell EMC VMAX Management Product Family
Mon, 10/03/2016
The Digital Defense, Inc. Vulnerability Research Team (VRT) has identified six previously undisclosed security vulnerabilities found in the Dell EMC VMAX Management Product family. Summary information for these flaws can be found below.Checks for the identified vulnerabilities are available now in Frontline™ Vulnerability Manager. Clients are encouraged to run a full vulnerability assessment which...
Vulnerability Research
Zero-Day Alert: Multiple Vulnerabilities Within the EMC VMAX
Mon, 10/03/2016
Today Digital Defense is publishing six zero-day vulnerabilities found in the Dell EMC VMAX Management Product family that our vulnerability research team discovered and brought to the attention of Dell EMC. Dell EMC has been extremely professional and worked diligently with Digital Defense engineering staff to understand, resolve and verify the fixes for these security issues.Dell EMC has...
Blog
Don’t Get Hooked: How to Recognize and Avoid Phishing Attacks (Infographic)
Tue, 09/27/2016
We created an infographic to help spread awareness of one of the greatest and most common threats to computer users of all kinds: phishing attacks.
Blog
Eight Ways to Avoid Becoming Phish Bait
Tue, 09/20/2016
Is your organization capable of defending against today’s phishing attacks? Social Engineering requires very little to no knowledge of information technology or cutting-edge applications. All an attacker needs is a target and a crafty email to prey on weaknesses in human behavior.Don’t Take the Bait! Tips to Help Defend Against a Phishing AttackBe suspicious of emails asking you to “verify” your...
Blog
The Five Steps of Incident Response
By Cybersecurity Experts at Fortra on Tue, 09/20/2016
Part 5 of our Field Guide to Incident Response Series outlines 5 steps that companies should follow in their incident response efforts.
Blog
Creating an Incident Response Classification Framework
Wed, 09/14/2016
Part 4 of our Field Guide to Incident Response series outlines a two-tiered framework for classifying security incidents to enable more efficient incident prioritization and response. This video clip is taken from our webinar, Incident Responder's Field Guide - Lessons from a Fortune 100 Incident Responder. Feel free to watch the full webinar here.
Blog
Veritas InfoScale Operations Manager Vulnerabilities
Wed, 09/07/2016
Today, Fortra is publishing two zero-day vulnerabilities found in the Veritas InfoScale Operations Manager that our vulnerability research team discovered and brought to the attention of Veritas. Veritas has been extremely professional and worked diligently with Digital Defense engineering staff to understand, resolve and verify the fixes for these security issues.Veritas has released fixes for...
Blog
Building Your Incident Response Team: Key Roles and Responsibilities
Tue, 09/06/2016
In our Field Guide to Incident Response series, we cover a critical component of IR planning: assembling your internal IR team.
Blog
IT Risk Mitigation
By Per Bauer on Thu, 09/01/2016
It's a brave new world for IT. And it often seems impossible to predict future demand and guard against performance risks.
You have mountains of data, scalable cloud infrastructures, and a complex web of IT environments. It's complicated, to say the least.
And it's matched by skyrocketing consumer demand for and reliance on online services.
Bottom line: outages are more dangerous to a company...