Skip to Main Content

The Security Blog

Get up-to-date security insights, tips, and tricks from our amazing team sent to your inbox.

Browse our blogs

We cover it all in The Security Blog. Discover what you’ve been looking for.

Topics
Author
Blog April 01 2025

CUI For the Rest of Us: The New Government-Wide CUI Protection Contract Clause

U.S. government contractors need to start preparing for a proposed new government-wide Controlled Unclassified Information (CUI) protection requirement.

Read about this article
Blog March 28 2025

MCP: An Introduction to Agentic Op Support

1.1      IntroductionAgents and Large Language Models (LLMs) offer a powerful combination for driving automation. In this post, we’ll explore how to implement…

Read about this article
Blog March 27 2025

Getting the Most Out of Your API Security Assessment

Tips for what you can do in advance of an API Security Assessment to help us avoid delays and ensure the process runs smoothly and benefits everyone.

Read about this article
Blog March 25 2025

PCI DSS Payment Card Data Retention

The Payment Card Industry Data Security Standard (PCI DSS) applies to and has specific requirements for retention of Account Data. In general, organizations…

Read about this article
Blog March 21 2025

Trimarc Joins TrustedSec: Strengthening Our Commitment to Security

Play We’re excited to share some big news: Trimarc Security is now fully operating under TrustedSec! This marks a significant step forward in our mission to…

Read about this article
Blog March 18 2025

Are Attackers "Passing Through" Your Azure App Proxy?

TL;DR - Azure app proxy pre-authentication set to Passthrough may unintentionally expose private network resources.Microsoft’s Azure app proxy allows for…

Read about this article
Blog March 11 2025

Abusing Windows Built-in VPN Providers

Some interesting things happen when you connect to a virtual private network (VPN). One that recently caught my interest is updates to the routing table.…

Read about this article
Blog March 06 2025

Measuring the Success of Your Adversary Simulations

Adversary Simulations (“AdSim” or “Red Teams”) represent a serious commitment on the part of an organization. In the United States, AdSim engagements are…

Read about this article
Blog March 04 2025

The Hidden Trap in the PCI DSS SAQ A Changes

Implementing requirements 6.4.3 and 11.6.1, or using a WAF to protect against script-based attacks, to meet PCI SSC's new eligibility criterion for SAQ A…

Read about this article
Blog February 25 2025

A Threat Hunter’s Guide to Decoding the Cloud

This blog will guide you through how to be a successful threat hunter in cloud environments, along with some helpful tips and advice.

Read about this article
Blog February 20 2025

Exploring NTDS.dit – Part 1: Cracking the Surface with DIT Explorer

NTDS.dit is the file housing the data for Windows Active Directory (AD). In this blog post, I’ll be diving into how the file is organized. I’ll also be walking…

Read about this article
Blog February 18 2025

Getting Started Using LLMs in Application Testing With an MVP

Are you interested in incorporating Large Language Models (LLMs) into app tests yet lack the tooling to get you there? This blog walks through how to start…

Read about this article

Loading...