Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

Mitigate attacks, contain movement, and regain operations

Respond to threats to your security program with the help of our security experts.

Threat and incident response services

Discover services to respond to threats to your security program.

Loading...

Security expertise meets security passion

Meet the talented, security-obsessed team invested in achieving your goals.

“Having access to industry leaders right here at TrustedSec makes solving our clients' challenges easier.”
Paul SemsManaging Director of Remediation Services
“For me it’s more of a life choice and a passion than anything else. I don’t consider it work at all. I get to work with some of the best, most talented hackers in the world, literally.”
Jason LangPractice Lead, Targeted Operations
“Leveraging the collective intelligence of TrustedSec is like a cheat-code I get to use every day.”
Costa PetrosSenior Security Consultant
Blog

The First Steps on Your Zero Trust Journey

Find out how the NIST 800-207 framework is a starting point that demystifies Zero Trust.

Practical cybersecurity thought-leadership

Discover our experts’ innovative blogs, webinars, podcasts.

Blog March 19 2026

Full Disclosure: A Third (and Fourth) Azure Sign-In Log Bypass Found

Invisible password sprays. Invisible logins. Full tokens returned.Nyxgeek here. It's 2026 and I've got two more Azure Entra ID sign-in log bypasses…

Read about this article
Webinars March 18 2026

Copilot Security: What to Know Before You Go

In this webinar, our experts will walk you through the critical groundwork needed before deploying Microsoft 365 Copilot. Learn how you can best prepare for…

Read about this article
Blog March 17 2026

Better Together: Combining Automation and Manual Testing

When I started working in mobile application security in 2018, most testing was still largely manual. Since then, the ecosystem has exploded with scanners,…

Read about this article
Blog March 12 2026

LnkMeMaybe - A Review of CVE-2026-25185

A Windows shortcut (.lnk) seems very simple on the surface. It is a file that points somewhere and tells the system to open or execute a resource. A shortcut…

Read about this article
Blog March 10 2026

Building a Detection Foundation: Part 3 - PowerShell and Script Logging

The Second Most Important Data Source You're Probably Not CapturingIn Part 2, we enabled process creation logging with command lines. That's a big…

Read about this article
Podcasts March 09 2026

Security Noise - IR Evolve

With cyber threats advancing daily, how are we changing the way we respond? On this episode of Security Noise, we are discussing how incident response is…

Read about this article
Blog March 05 2026

Building a Detection Foundation: Part 2 - Windows Security Events

The Audit Policies Nobody ConfiguresIn Part 1, we looked at why relying on a single telemetry source is a recipe for blind spots. Now let's get practical.…

Read about this article
Webinars March 04 2026

CMMC Challenges and Misunderstandings

During our next webinar, our experts will cover CMMC misunderstandings that are creating the most problems for defense contractors and subcontractors, from CUI…

Read about this article
Blog February 24 2026

Building a Detection Foundation: Part 1 - The Single-Source Problem

The Uncomfortable Truth About Your Telemetry Let me start with an observation that might hit close to home. In my years working Incident Response cases and…

Read about this article
Podcasts February 23 2026

Security Noise - Ten Years: A Decade of Doing This

David Kennedy and Kelsey Segrue join us to discuss ten years of our podcast! We discuss how the cybersecurity space has evolved over the years and social media…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.