
Tales From the Road: What Effective Endpoint Security Looks Like
Well-configured endpoint security is critical to protect against a ransomware attack or a security breach, and requires some extra attention.

Successful mitigation of today’s security threats requires an approach that is both on the offensive and on the defensive. Here, we give our take on how to approach and handle specific security challenges, as well as our reaction to some of the latest industry topics.

Well-configured endpoint security is critical to protect against a ransomware attack or a security breach, and requires some extra attention.

It’s time to rethink your password policy to prevent modern password attacks. If you think your company’s policy of requiring passwords to have a minimum length of eight characters, in addition to other complexity requirements, is sufficient to effectively prevent modern password attacks, think again. Our client, a global corporation with business units in more… Read more »

Avoid these three pitfalls that are inherent to most SCADA systems that manage critical infrastructure. A multinational corporation enlisted the services of DirectDefense to perform a security assessment of the organization’s newly-developed battery energy storage control (BESS) that would enable the company’s vendors and integrators to manage the voltage and power output for massive batteries.… Read more »

Newsflash: Most networks utilized for Supervisory Control and Data Acquisition (SCADA) were not designed to be secure. Yes, you read that correctly. Kind of a scary thought, especially when your municipal water utility is reliant on this SCADA network to ensure the availability and safety of the drinking water supply! This is why the management… Read more »

Tighten Cybersecurity Controls Before the Next Ransomware Attack Comes to You Food production is highly regulated by the Federal Food & Drug Administration (FDA) and U.S. Department of Agriculture (USDA) to ensure food safety. However, the computer systems that are used to accomplish and maintain food safety processes don’t fall under the purview of those… Read more »

How we identified serious vulnerabilities in a client’s web app that would allow bad actors to view confidential information.

How a recent DirectDefense physical penetration test to test PCI compliance demonstrated how credit card data could be easily stolen.

How DirectDefense leveraged the pandemic to exploit remote access security for a large corporate network through an email phishing campaign While most of the world was busy adapting to the Work from Anywhere #WFA movement that the pandemic suddenly brought on, a certain segment of the population saw a unique opportunity to get into an… Read more »

When it comes to email security, did you know your out-of-office autoresponder could be making your organization more vulnerable to attack?

How a recent DirectDefense security assessment revealed a common application vulnerability through commandeering access controls.