Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

79 results found for basic

79 results found for basic:

The Debate on Security Education and Awareness

Effective security education and awareness programs arm employees with basic knowledge, enabling them to notify security teams in critical situations, and driving a security-driven culture within organizations, resulting

https://trustedsec.com/blog/the-debate-on-security-education-and-awareness

Understanding the Why

Understanding the simple security basics is crucial to preventing incidents, and a lack of knowledge or resources often leads to missed patches, misconfigurations, and security breaches.

https://trustedsec.com/blog/understanding-the-why

Let's Build a Card Cloner

This post isn't attempting to present new research or a new device—that work has already been done, a la Bishop Fox. While an overall design was created, and many others have discussed building such a device, doing so can prove to be challenging.…

https://trustedsec.com/blog/lets-build-a-card-cloner

Detections and Defensive Insights From the ContiLeaks

Learn how to practically use the ContiLeaks leak to improve your organization's security with Incident Response Consultants Steven Erwin, Ashley Pearson, and Nick Gilberti, experts in APT group tactics and defense.

https://trustedsec.com/resources/webinars/detections-and-defensive-insights-from-the-contileaks

Rockie Brockway

Rockie Brockway, a 30+ year InfoSec expert, helps organizations align security with business needs, enabling innovation and protecting brand value.

https://trustedsec.com/team-members/rockie-brockway

The Evolution of Red Teaming and Pen Testing: Integrating Adversary Simulation at Every Maturity Level

Learn how to strengthen your organization's security response to evolving attacks and progress your program with actual data and industry insights from security expert David Kennedy.

https://trustedsec.com/resources/webinars/the-evolution-of-red-teaming-and-pen-testing-integrating-adversary-simulation-at-every-maturity-level

Getting a Grip on CMMC—Tips and Tricks for the new Cybersecurity Maturity Model Certification

Join Security Program Director Stephen Marchewitz and Governance, Risk, and Compliance Principal Consultant Rick Yocum as they discuss achieving Cybersecurity Maturity Model Certification (CMMC) and navigating the DoD su

https://trustedsec.com/resources/webinars/getting-a-grip-on-cmmc-tips-and-tricks-for-the-new-cybersecurity-maturity-model-certification

Webinar Series - Fundamentals of Post-Exploitation with Carlos Perez

Carlos shares his expert insights on network exploitation and enumeration, covering situational awareness, credential collection, and lateral movement.

https://trustedsec.com/resources/webinars/webinar-series-fundamentals-of-post-exploitation-with-carlos-perez

COFFLoader

Building your own in memory loader or how to run BOFs

https://trustedsec.com/research/coffloader

A Hitch-hacker's Guide to DACL-Based Detections (Part 1A)

blue team

https://trustedsec.com/blog/a-hitchhackers-guide-to-dacl-based-detections-part-1-a
Prev 1 2 3 4 5 Prev