The First Steps on the Zero Trust Journey

One of the most discussed concepts in the Information Security world in recent history has been Zero Trust. Although many vendors claim to have products for implementing Zero Trust, an organization must not view them as an instant solution to achieving Zero Trust. Zero Trust should be viewed as a philosophy comprised of many controls…

The post The First Steps on the Zero Trust Journey appeared first on TrustedSec.

Continue reading The First Steps on the Zero Trust Journey

Measuring the Impact of a Security Awareness Program

Our goal in building a security awareness program is to embed security into our partners’ existing organizational culture. Impacting culture is a long-term process that can take years and requires executive support. If you are tasked with managing a security awareness program, it is your job to measure and show leadership that your program is…

The post Measuring the Impact of a Security Awareness Program appeared first on TrustedSec.

Continue reading Measuring the Impact of a Security Awareness Program

NFT Crime: From the Simple to the Ingeniously Simple

If you guessed these two things—a 10-kilo bar of gold and this image from the Bored Ape Yacht Club (BAYC)—cost about the same, roughly $600,000, you’d be right. And if it’s hard to believe this is true, you’d be like almost everyone else in the world. Basically, a one-of-a-kind cartoon in a type of video…

The post NFT Crime: From the Simple to the Ingeniously Simple appeared first on TrustedSec.

Continue reading NFT Crime: From the Simple to the Ingeniously Simple

Is Cyber Insurance Becoming Worthless?

New challenges have emerged that make it difficult to transfer risk. Ransomware has changed the game An overlooked yet the increasingly important challenge in information risk management is finding the right balance between cybersecurity and cyber insurance. We continue to see organizations hit with ransomware from a variety of vectors, including spam emails, drive-by downloads,…

The post Is Cyber Insurance Becoming Worthless? appeared first on TrustedSec.

Continue reading Is Cyber Insurance Becoming Worthless?

A Fifth of IT Decision-Makers Not Confident in Their OT System Security, Reveals Survey

Attacks against operational technology (OT) and industrial control systems (ICS) grew dramatically in the past few years. Indeed, a 2020 report found that digital attacks against those two kinds of assets increased by over 2000% between 2018 and 2020. … Continue reading A Fifth of IT Decision-Makers Not Confident in Their OT System Security, Reveals Survey

Companies on High Alert for Unemployment Fraud

Proactive Measures to Thwart Unemployment Fraud In the past few months, the TrustedSec Incident Response team has responded to several incidents of unemployment benefit fraud. Due to the pandemic and nationwide lockdowns, there has been an extremely high volume of unemployment claims submitted across the United States, and with greater instances of fraud making it difficult…

The post Companies on High Alert for Unemployment Fraud appeared first on TrustedSec.

Continue reading Companies on High Alert for Unemployment Fraud

Five worthy reads: Decision intelligence for critical business moments

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore decision intelligence.
AI and analytics are playing critical roles in driving innovation among many … Continue reading Five worthy reads: Decision intelligence for critical business moments

An Update On Non-Aggressive Reporting

Reporting is an essential piece of the penetration testing puzzle. It’s the product your client will be reviewing within their organization, representing you and your company to those you may not have worked with directly. With that in mind, it’s important that your product, the report, strikes a balance between professional tone and cold facts….

The post An Update On Non-Aggressive Reporting appeared first on TrustedSec.

Continue reading An Update On Non-Aggressive Reporting

One Size Doesn’t Fit All: Penetration Testing Maturity

As the security industry continues to progress, companies are focusing on their own security programs, trying to figure out what works and what doesn’t. One of the areas of focus that goes to the early days of the security industry is penetration testing. Penetration testing has always been a validation method to identify exposures and…

The post One Size Doesn’t Fit All: Penetration Testing Maturity appeared first on TrustedSec.

Continue reading One Size Doesn’t Fit All: Penetration Testing Maturity