Webinar: Blockchain Security—Aligning to upcoming digital business initiatives

This webinar will take place on Wednesday, October 16th at 1pm Eastern Blockchain technology has been out for a while and has advertised many benefits over various transactions, including transparency, security, and speed. With these promises, several organizations have exploratory projects looking to take advantage of this technology. What could possibly go wrong? While this sounds…

The post Webinar: Blockchain Security—Aligning to upcoming digital business initiatives appeared first on TrustedSec.

Continue reading Webinar: Blockchain Security—Aligning to upcoming digital business initiatives

Dealing With Third-Party Risk Assessments: Creating and responding to vendor questionnaires

Wednesday, September 25th at 1 p.m. EST Ain’t nobody got time for that! Are you feeling overwhelmed? Have you been diagnosed with a case of audit fatigue? The growth in third-party assessment requests has exploded–more and more organizations are being forced to fill out third-party vendor forms and create or formalize third-party risk functions. The…

The post Dealing With Third-Party Risk Assessments: Creating and responding to vendor questionnaires appeared first on TrustedSec.

Continue reading Dealing With Third-Party Risk Assessments: Creating and responding to vendor questionnaires

TrustedSec Podcast Episode 3.18 – Live From Vegas!

Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Geoff Walton, Hans Lakhan, and David Boyd In this episode we share what happened in Vegas! Wait is that allowed? Links from the show: Proxmark3 API Induced SSRF…

The post TrustedSec Podcast Episode 3.18 – Live From Vegas! appeared first on TrustedSec.

Continue reading TrustedSec Podcast Episode 3.18 – Live From Vegas!

Attacks on the Rise Through Office 365

Office 365 is the most popular line of digital services for businesses for a reason, but when it comes to cyberattacks, its ubiquity is creating challenges. If it seems like every week there’s a new headline about a large-scale hacking incident, it’s not a case of rampant fake news. According to the 2018 Symantec Internet…

The post Attacks on the Rise Through Office 365 appeared first on TrustedSec.

Continue reading Attacks on the Rise Through Office 365

Going Purple: Measurably improving your security posture with Purple Team engagements

Join us Wednesday, August 10th at 1pm Eastern Adversaries continue to morph tactics and identify new ways of attacking organizations. Whether emulating a perimeter breach or the more popular phishing attack on the user population, it has never been more important to attack patterns and categorize behavior to defend against them. What’s the process and…

The post Going Purple: Measurably improving your security posture with Purple Team engagements appeared first on TrustedSec.

Continue reading Going Purple: Measurably improving your security posture with Purple Team engagements

TrustedSec Podcast Episode 3.17 – The End of End to End

Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Geoff Walton, Rob Simon, David Boyd, and Alex Hamerstone Title: Kazakhstan’s HTTPS InterceptionURL: https://censoredplanet.org/kazakhstan Author: Ram Sundara Raman1, Leonid Evdokimov, Eric Wustrow2, Alex Halderman1, Roya Ensafi Title: DMARC’s…

The post TrustedSec Podcast Episode 3.17 – The End of End to End appeared first on TrustedSec.

Continue reading TrustedSec Podcast Episode 3.17 – The End of End to End

Webinar: Network Segmentation for the Rest of Us! How to get your segmentation project moving toward zero trust.

Join us Wednesday, July 24 at 1:00PM Eastern The idea of segmenting your network is not new. However, even in 2019, we still see companies with flat networks ripe for attack. This provides a much greater opportunity for malicious actions or even accidental incidents to occur. The benefits are clear. Splitting up your network into…

The post Webinar: Network Segmentation for the Rest of Us! How to get your segmentation project moving toward zero trust. appeared first on TrustedSec.

Continue reading Webinar: Network Segmentation for the Rest of Us! How to get your segmentation project moving toward zero trust.

Microsoft MVP Awards 2019

Who are MVPs? Microsoft Most Valuable Professionals, or MVPs, are technology experts who passionately share their knowledge with the community. For more information on this award, visit the Microsoft MVP Overview page. According to Microsoft, MVPs “are always on the ‘bleeding edge’ and have an unstoppable urge to get their hands on new, exciting technologies.”…

The post Microsoft MVP Awards 2019 appeared first on TrustedSec.

Continue reading Microsoft MVP Awards 2019