We share our expertise to make the world a safer place.
InfoSec moves at a rapid pace and sometimes it’s hard to keep up—that’s where we enter the chat.
Discover current cybersecurity insights
Get vital information straight from the experts, without all the noise.
2024 Conference Roundup
Join our panelists David Kennedy, Justin Elze, Jason Lang, and Oddvar Moe for their firsthand accounts and perspectives on what people were talking about at…
DOD Contract Compliance: DFARS 7012 and CMMC
Advisory Compliance Practice Lead Chris Camejo will take a deep dive into the Department of Defense requirements for protecting FCI and CUI.
The Lost Underground
Join TrustedSec Principal Security Consultant Mike Felch for an eye-opening journey into the lost underground, where ingenuity, disobedience, and complexity…
BEC Basics: Your First Step to Thwarting Email Scams
Join Senior Security Consultant Steven Erwin and Security Consultant Caroline Fenstermacher as they cover the basics of BEC analysis, providing participants…
Navigating Compliance: FCI and CUI Requirements for Federal Contractors
TrustedSec Advisory Compliance Services Practice Lead Chris Camejo provides a comprehensive overview of the definition, scope, and protection requirements for…
Ask Me Anything: Mobile Security
Join our expert panel led by TrustedSec Mobile Testing Practice Lead Rob Simon, Principal Consultant Drew Kirkpatrick, and Senior Security Consultant Whitney…
Ask Me Anything: Advanced Cloud Pen Testing Scenarios
Join TrustedSec Force Cloud Security Practice Lead Paul Burkeland, along with Principal Security Consultant Mike Felch and Security Consultants Edwin David and…
Calculating Business Impact
In today’s digital landscape, gaining a deep understanding of how cybersecurity threats can affect business-critical systems is crucial for maintaining…
Understanding and Documenting PCI DSS Scope
As new PCI DSS guidance emerges, the expectations placed on auditors and the entities they assess are evolving. New requirement 12.5.2 defines scope…
Ask Me Anything: Proactive Threat Hunting
As threat actors become more sophisticated, organizations' approaches to finding malicious activity must become more proactive and refined. Dive into the…
Specula: A Red Team Chronicle
Microsoft Outlook is often used as the primary email client in corporate environments, making it a high-value target for threat actors. Any potential to…
Ask Me Anything: Remediation
Join the TrustedSec Remediation Team as they discuss how to prioritize and identify deficiencies in your cloud platform and examine best practices to harden…
Loading...
Get our best blogs, latest webinars, and podcasts sent to your inbox.
Our monthly newsletter makes it easy to stay up-to-date on the latest in security.