Offense + Defense

Successful mitigation of today’s security threats requires an approach that is both on the offensive and on the defensive. Here, we give our take on how to approach and handle specific security challenges, as well as our reaction to some of the latest industry topics.

  • About Us
  • Support
Get Started
  • Solutions
    • Overview
    • Security Need
      • Overview
      • Application Security
      • Network Security
      • Cloud / Mobility Security
      • Malware
      • Mergers & Acquisitions
      • Peace of Mind / E-Discovery
      • Privacy
      • Protection From Advanced Threats
      • Research, Technology & Validation
      • Skill Set Deficiency
      • Threat Mitigation
    • Security Vertical
      • Overview
      • Aerospace / IFE
      • Automotive / IUE
      • Energy & Utilities
      • Financial Services & Insurance
      • Gaming & Entertainment
      • Healthcare
      • Educational Institutions
      • Retail & Hospitality
      • Technology & Manufacturing
    • Security Compliance
      • Overview
      • PCI Compliance
      • CMMC
      • HIPAA / HITECH
      • ISO 27001 / 27002
      • Data Privacy
      • GDPR
      • FCA
      • GLBA
      • NCUA / FFIEC
      • NERC CIP
      • FISMA/FedRAMP
      • Enterprise Risk Assessment
      • Cybersecurity Strategy and Roadmaps
    • Solutions
  • Services
    • Overview
    • Managed Services
      • Overview
      • Managed Detection Response
      • Siem
      • Breach Detection
      • Endpoint Protection
      • DDOS
      • Email Security
      • Encryption
      • Firewall
      • IDS / IPS
      • Incident Response, Forensics & Malware Analysis
      • NAC
      • Remediation & Vulnerability
      • Secure Web Gateway
      • Security Operations Management
      • Threat Analysis
      • UTM
      • Web Application Firewall
    • Connected Systems
      • ICS / SCADA Real-Time Monitoring
      • Technical Assessment
      • Architecture Review & Assessment
      • Mobile Device & Application Testing
      • Smart Device Testing
      • IoT / IIoT
      • Smart Cities
      • Embedded Systems
    • Professional Services
      • Overview
      • Testing
      • Compliance
      • Training
      • Talent Acquisition
      • ThreatAdvisor
    • Services
  • Resources
    • Overview
    • Blog
    • Upcoming Events
    • Documentation
    • GitHub
    • In The News
  • Solutions
    • Overview
    • Security Need
      • Overview
      • Application Security
      • Network Security
      • Cloud / Mobility Security
      • Malware
      • Mergers & Acquisitions
      • Peace of Mind / E-Discovery
      • Privacy
      • Protection From Advanced Threats
      • Research, Technology & Validation
      • Skill Set Deficiency
      • Threat Mitigation
    • Security Vertical
      • Overview
      • Aerospace / IFE
      • Automotive / IUE
      • Energy & Utilities
      • Financial Services & Insurance
      • Gaming & Entertainment
      • Healthcare
      • Educational Institutions
      • Retail & Hospitality
      • Technology & Manufacturing
    • Security Compliance
      • Overview
      • PCI Compliance
      • CMMC
      • HIPAA / HITECH
      • ISO 27001 / 27002
      • Data Privacy
      • GDPR
      • FCA
      • GLBA
      • NCUA / FFIEC
      • NERC CIP
      • FISMA/FedRAMP
      • Enterprise Risk Assessment
      • Cybersecurity Strategy and Roadmaps
    • Solutions
  • Services
    • Overview
    • Managed Services
      • Overview
      • Managed Detection Response
      • Siem
      • Breach Detection
      • Endpoint Protection
      • DDOS
      • Email Security
      • Encryption
      • Firewall
      • IDS / IPS
      • Incident Response, Forensics & Malware Analysis
      • NAC
      • Remediation & Vulnerability
      • Secure Web Gateway
      • Security Operations Management
      • Threat Analysis
      • UTM
      • Web Application Firewall
    • Connected Systems
      • ICS / SCADA Real-Time Monitoring
      • Technical Assessment
      • Architecture Review & Assessment
      • Mobile Device & Application Testing
      • Smart Device Testing
      • IoT / IIoT
      • Smart Cities
      • Embedded Systems
    • Professional Services
      • Overview
      • Testing
      • Compliance
      • Training
      • Talent Acquisition
      • ThreatAdvisor
    • Services
  • Resources
    • Overview
    • Blog
    • Upcoming Events
    • Documentation
    • GitHub
    • In The News
  • About Us
  • Support
DirectDefenseDirectDefense

Document Type: Case Study

Case Study: CMMC Compliance – Government Contractor

Case Study: MSSP – Securing Large Events

Case Study: Tabletop Exercise – University

Case Study: M&A – Pre-Acquisition Security

Case Study: Incident Response – Ransomware

Case Study: IFE App Testing – Aerospace

Case Study: SCADA Security – Manufacturing

How DirectDefense Assessed a Supervisory Control and Data Acquisition (SCADA) Architecture to Secure Food Logistics Processes.

Case Study: SCADA Security – Engineering

How DirectDefense Assessed a Supervisory Control and Data Acquisition (SCADA) Architecture to Strengthen Vital Infrastructures

Case Study: PCI Compliance – Hospitality

Case Study: Talent Acquisition – SOX Compliance

  • 1
  • 2
  • Next

Categories

  • All Categories
    • Corporate
    • Security
    • Tales from the Road
    • Technical

Tags

Data Security Password Protection physical security

Sign up for the latesest security threat news.

Sign up for the latest security threat news.

Like what you’re seeing? Contact us today.

Get Started
  • Home
  • Careers
  • Locations
  • Contact Us
© 2021 DirectDefense - All Rights Reserved    Privacy  //  Site Map     Website by: Fishnet MediaFishnet Media

Find us on LinkedInFind us on LinkedInFollow us on TwitterFollow us on TwitterLike us on FacebookLike us on FacebookRSSRSS

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. ACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.