Blog

Blog

Learning Cyber Defense Strategies from Stratego Strategy

I grew up in an environment filled with fun and engaging games. My parents, who were Grand Life Masters in the game of Bridge, believed their children could “learn to think” by playing and facing challenges presented by different strategy games. Growing up my family played many hours of strategy games such as Chess, Risk, Bridge, and many others. One of my favorite games was Stratego. As CTO of an...
Blog

Vulnerability Research Team Shares Details Regarding Recent Zero-Day Discoveries

Today Fortra is publishing several high-impact vulnerabilities on the Dell SonicWall GMS platform that our vulnerability research team discovered and brought to the attention of Dell. Dell has been extremely professional and worked diligently with Fortra engineering staff to understand, resolve and verify the fixes for these security issues. Dell has released fixes and customer advisories for...
Blog

Benefits Of Email Classification Software

Email classification software gives businesses the ability to classify emails in accordance with their sensitivity. This ensures that you have better control over data, and that confidential information is only shared with intended recipients. Read on to discover more about the benefits of such software in further detail.Assess your company’s level of...
Blog

6 Ways to Keep Your Kids Safe Online

As children are increasingly targeted in online attacks, parents must take steps to instill secure computing habits and protect their kids' devices. Here are 6 tips for keeping your kids safe online.
Blog

The Third Party Data Breach Problem

Data breaches via third parties are a growing problem impacting companies across many industries – and one that can be even more difficult to defend against. How can companies secure their assets against cyber attacks that target suppliers and partners or use information stolen in previous breaches?
Blog

Six considerations for mitigating risk in IoT devices

IoT has already developed a reputation for poor security. As connected devices become more engrained in our day to day business and personal lives, producers of IoT technology should follow these six tips to shore up IoT security.
Blog

What Is Queuing Theory?

Queuing theory is the study of queues, otherwise known as waiting lines. It sounds straightforward. But unless you have an advanced math degree, queuing theory can be difficult to understand. That’s why we’re clarifying queuing theory basics.
Blog

What is FTP Security? Securing FTP Usage

File Transfer Protocol is widely used in corporate networks yet has inherent data security risks. Here’s an overview of some of the challenges of FTP security and methods to address them.
Vulnerability Research

Finding the Solarwinds Flaw

Several months back I was updating our vulnerability scanner checks for various Solarwinds products. As I added a detection script for a product called Log and Event Manager (LEM), I realized that there were really no significant publicly disclosed vulnerabilities for it. This spurred me to download their trial, which comes as a virtual appliance, and look for some flaws. After initially setting...
Vulnerability Research

DDIVRT-2015-55 SolarWinds Log and Event Manager Remote Command Execution

Title: DDIVRT-2015-55 SolarWinds Log and Event Manager Remote Command ExecutionSeverity: HighDate Discovered: August 15, 2015Discovered By: Chris Graham @cgrahamsevenVulnerability Description:SolarWinds Log and Event Manager (LEM) is vulnerable to an Extensible Markup Language (XML) external entity injection through the agent message processing service. This service listens on TCP port 37891....