Skip to Main Content

Mitigate attacks, contain movement, and regain operations

Respond to threats to your security program with the help of our security experts.

Threat and incident response services

Discover services to respond to threats to your security program.

Loading...

Security expertise meets security passion

Meet the talented, security-obsessed team invested in achieving your goals.

“TrustedSec allows me to help make an impact on our clients and help those in need.”
Tyler HudakPractice Lead, Incident Response
“For me it’s more of a life choice and a passion than anything else. I don’t consider it work at all. I get to work with some of the best, most talented hackers in the world, literally.”
Jason LangPractice Lead, Targeted Operations
“Having access to industry leaders right here at TrustedSec makes solving our clients' challenges easier.”
Paul SemsManaging Director of Remediation Services
Blog

The First Steps on Your Zero Trust Journey

Find out how the NIST 800-207 framework is a starting point that demystifies Zero Trust.

Practical cybersecurity thought-leadership

Discover our experts’ innovative blogs, webinars, podcasts.

Webinars September 25 2024

BEC Basics: Your First Step to Thwarting Email Scams

Attackers never stop evolving their business email compromise (BEC) tactics, leveraging phishing, credential harvesting, and email spoofing to infiltrate…

Read about this article
Blog September 12 2024

Putting Our Hooks Into Windows

We're back with another post about common malware techniques. This time we are talking about setting Windows hooks. This is a simple technique that can be used…

Read about this article
Podcasts September 06 2024

Security Noise - Episode 7.1

CrowdStrike After Action

Read about this article
Blog September 03 2024

When on Workstation, Do as the Local Browsers Do!

1    IntroductionWeb browsers are common targets for many different APTs. Tools like Redline Malware or penetration testing tools such as SharpChrome or…

Read about this article
Blog August 29 2024

Gobbling Up Forensic Analysis Data Using Velociraptor

Lately I have been working with Velociraptor for its endpoint and digital forensic capabilities and specifically spent time in many cases in the past two years…

Read about this article
Blog August 22 2024

The Hunter’s Workshop: Mastering the Essentials of Threat Hunting

As an incident unfolds, skilled threat hunters with a special talent for uncovering hidden threats stand at the ready. These hunters smoke jump into the chaos…

Read about this article
Webinars August 21 2024

Understanding and Documenting PCI DSS Scope

As new PCI DSS guidance emerges, the expectations placed on auditors and the entities they assess are evolving. New requirement 12.5.2 defines scope…

Read about this article
Blog August 15 2024

Oops I UDL'd it Again

IntroductionPhishing. We all love phishing. This post is about a new phishing technique based on some legacy knowledge I had that can be used to get past email…

Read about this article
Blog August 13 2024

Must I TRA?: PCI Targeted Risk Analysis

Use of Targeted Risk Analysis (TRA) is a PCI best practice until March 31, 2025, at which time it becomes required for several controls across many assessment…

Read about this article
Webinars August 07 2024

Ask Me Anything: Proactive Threat Hunting

As threat actors become more sophisticated, organizations' approaches to finding malicious activity must become more proactive and refined. Dive into the…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.