Skip to Main Content

The Security Blog

Get up-to-date security insights, tips, and tricks from our amazing team sent to your inbox.

Browse our blogs

We cover it all in The Security Blog. Discover what you’ve been looking for.

Topics
Author
Blog May 08 2025

I Got 99 Problems But a Log Ain’t One

1.1 IntroductionHere at TrustedSec, one of the goals of the Tactical Awareness & Countermeasures (TAC) team is to assess and enhance our partners' security…

Read about this article
Blog May 06 2025

Application Layer Encryption with Web Crypto API

OverviewIn web and mobile applications, we’ve been fortunate over the years to have such widespread use of HTTPS by way of TLS. The proliferation of HTTPS is…

Read about this article
Blog May 01 2025

Why the WAF

In my experience, most organizations are prepared to discuss the scope of penetration tests when preparing for an External or Internal Penetration Test, but…

Read about this article
Blog April 24 2025

The Necessity of Active Testing – Detection Edition

Most security teams understand the importance of log collection and building detections to provide early indicators of anomalous or potentially malicious…

Read about this article
Blog April 22 2025

How Far Should You Let Penetration Testers Go?

How far should you let penetration testers go once they have a finding or foothold on a penetration test of your organization?As far as they can!The goal is to…

Read about this article
Blog April 17 2025

Discovering Your Baud

I'm still pretty new to hardware hacking and find myself going through a lot of media (both text and moving pictures) about various techniques to interact with…

Read about this article
Blog April 16 2025

TrustedSec Achieves CREST Certification

TrustedSec has achieved CREST Certification for penetration testing, a globally recognized standard that verifies an organization's ability to conduct…

Read about this article
Blog April 08 2025

Kubernetes for Pentesters: Part 1

In the first section of this multi-part practical guide, I’ll introduce you to Kubernetes (K8s) from a penetration testing perspective, including basic…

Read about this article
Blog April 01 2025

CUI For the Rest of Us: The New Government-Wide CUI Protection Contract Clause

U.S. government contractors need to start preparing for a proposed new government-wide Controlled Unclassified Information (CUI) protection requirement.

Read about this article
Blog March 28 2025

MCP: An Introduction to Agentic Op Support

1.1      IntroductionAgents and Large Language Models (LLMs) offer a powerful combination for driving automation. In this post, we’ll explore how to implement…

Read about this article
Blog March 27 2025

Getting the Most Out of Your API Security Assessment

Tips for what you can do in advance of an API Security Assessment to help us avoid delays and ensure the process runs smoothly and benefits everyone.

Read about this article
Blog March 25 2025

PCI DSS Payment Card Data Retention

The Payment Card Industry Data Security Standard (PCI DSS) applies to and has specific requirements for retention of Account Data. In general, organizations…

Read about this article