Is Your Security Ecosystem Inaccurately Portraying Your Information Security Risk?

Consequences of Integrating with a Limited Vulnerability Management System

Breaches are happening at alarming rates. No organization too large or too small is safe from the likelihood that a cyber criminal could potentially leverage network vulnerabilities to gain access to sensitive data.

In this whitepaper we share our continued concerns and warnings with customers.

Is Your Vulnerability Management Program Evolving?
DDI Introduces the Vulnerability Management Maturity Model – VM3

Digital Defense, Inc. (DDI) EVP/Chief Technology Officer, Gordon MacKay presents thought-provoking insight in a newly published white paper, Vulnerability Management Maturity Model: VM3. MacKay provides a guide to achieving higher levels of vulnerability management maturity.

Learn about the evolution of vulnerability management to assess where your organizations stands and how best to heighten your level of maturity and security. This paper is intended for C-Level executive decision makers, as well as security practitioners to all organizations levels who are interested in understanding and controlling their security risk and evolving their vulnerability management process.

Does Root Cause Analysis Support Guidance by Experts to Shift Spending? Doing the Math: Lessons learned from the JPMorgan Chase & Anthem Security Breaches Whitepaper

Digital Defense, Inc. (DDI) EVP/Chief Technology Officer, Gordon MacKay presents thought-provoking insight that calculates the risk of reduced spending on preventive safeguards in favor of incident response solutions (IR) by examining the landscapes and root causes of recent breaches.

Learn how a mathematical based investigation resulted in key findings that offer perspective into reducing the risk of a breach.

Network Host Reconciliation

Many organizations are unknowingly at risk of a devastating security breach. Why? A false sense of security and misplaced faith in highly touted scanning tools that provide misleading information to the user. Could it be that the reason breaches are being reported almost daily now is due to inaccurate results organizations are relying on to make critical security decisions? Millions of dollars are being spent on technology that does not have the capability to accurately reconcile vulnerability scanning results from scan to scan, opening the door to crippling breaches.

Click button to open or right click to save. Problems viewing? Click Here.

External Vulnerability Assessments, External Penetration Tests, And You

Intrusion Prevention System Whitelisting And Assessing Firewalls
The goal of the Digital Defense External Vulnerability Assessment (EVA) and External Penetration Test (EPT) is to assess the security of those devices on your external network generally available via the Internet. Digital Defense attempts to assess the security of these devices and their associated TCP/IP services to ensure hackers with malicious intent cannot gain unauthorized access to those systems from the Internet through a known vulnerability or misconfiguration. Typical services we observe and assess on external networks include, but are not limited to, public web servers, external mail servers, VPN gateways, etc. This paper discusses two topics that seem to generate a large amount of confusion throughout the industry among IT staff and/or security practitioners: the concept of “whitelisting” and assessing firewalls.

Click button to open or right click to save. Problems viewing? Click Here.

Bringing Your Security Eco-System Closer to Purity Utilizing a Vulnerability Data Refinery

Introducing a groundbreaking information security offering: Vulnerability Data Refinery (VDR). A technology that refines data from a variety of assessment sources providing higher levels of intelligence to rapidly and accurately identify true risk within organizations.

Click button to open or right click to save. Problems viewing? Click Here.

Top Five Critical Issues Affecting Servers

In this report, Mike Cotton, Vice President, Research and Development and the Digital Defense, Inc. Vulnerability Research Team provide intelligence on the state of security and the top five critical issues affecting servers, and offer recommendations and Decisive Security Intelligence to mitigate risk and bolster security.

Click button to open or right click to save. Problems viewing? Click Here.

Targeted Network Attacks

Learn about some common methods used by hackers during targeted network attacks and some steps you should take to combat them.

Click button to open or right click to save. Problems viewing? Click Here.

Realizing the Benefits of Vulnerability Management in the Cloud

Learn about two types of vulnerability management deliveries, cloud-based and premised-based. Challenges with vulnerability management are discussed and differences and advantages between cloud-based vulnerability management delivery and premise-based solutions are addressed.

Click button to open or right click to save. Problems viewing? Click Here.