You are not alone

Our Commitment to You During the Coronavirus

Notice to Our Customers While organizations around the world are reorganizing their workforces to handle the current health issue, I’d like to take this moment to reassure you that we at DirectDefense are well prepared to facilitate the services you count on us to provide for you. Unlike most industries that maintain a collective work… Read more »

MSP Notice: Increase in Brute Force Attempts

Significant Volume of Brute Force Attempts Against Ingress Authentication Sources In the past 72 hours there has been a significant volume of brute force attempts against various ingress authentication sources (like o365 or VPN solutions). We have seen this across all of our customers and that this activity is both typical for this time of… Read more »

The Security Attacks of 2019: A Year in Review

Revisiting the Security Threats That Marked 2019 and How They Were Managed Wow, what a year it has been! Security attacks in 2019 were marked by a resurgence of Ransomware attacks, business email compromise (BEC) attacks, and the discovery of painful blind spots in existing security programs for our new, and in some cases older,… Read more »

Limited Length SQL Injection

Limited Length SQL Injection

During application testing, most SQL injection attacks are mundane. Often, when there is one SQL injection, there are many–and they are easily exploitable with tools like sqlmap. Occasionally, an application is largely protected against SQL injection, but something interesting happens on a test. A tester manually validates a SQL injection vulnerability based on server responses,… Read more »

wooden blocks that read 2,0,1, 9 being put in place by a hand.

Information Security Predictions for 2019

Assessing the Successes (and Failures) of Organizations’ Information Security Orchestration and Automation Response Solutions As 2018 comes to a close, we must look at the information security and managed services trends already established this year, and those on deck for 2019. To get things going ahead of the new year, we thought we would share… Read more »

Improving Application Security Through Automated Testing

Improving Application Security Through Automated Testing

Turn Your Software Development Security into a Repeatable Engineering Process Companies have long viewed application security testing as a black art that’s dependent upon a small number of experts wielding arcane tools to find vulnerabilities and develop exploits. However, as the velocity of software development increases, the old way of running security tests becomes less… Read more »

a lack usb flash drive with no cap next to a keyboard

What’s in Your [Security] Wallet?

No, this blog post isn’t about the credit cards or identity theft. It’s about the tools that, as a security professional, you should keep stored in your “security wallet.” Like any tradecraft, security professionals should have a set of tools, in this case, applications, websites, and resources, that they keep on-hand. These items become your… Read more »

Third-Party Vendor Relationships are Risky Business

Third-Party Vendor Relationships are Risky Business

A version of this blog is also posted on the MIST InfoSec Insider site: https://misti.com/infosec-insider-search. We’re surrounded by networks, many not our own. It’s next to impossible to run a business today without network interconnectivity. Even the smallest mom-and-pop shop has a website and hosting provider that connect to at least one computer holding client… Read more »

2023 Security Operations Threat Report

X