Incident Response Team Adds Senior Consultant Justin Vaicaro

January 08, 2019 | By:

From TrustedSec Incident Response Team Lead Tyler Hudak: TrustedSec is a multi-disciplined company with many service offerings outside of the world-renowned penetration testing we are known for. Included in those offerings is our Incident Response team, which I am proud to lead. Today I am pleased to announce that we have expanded our Incident Response…

How to Reduce PCI Compliance Anxiety

January 08, 2019 | By:

What type of emotions are created in you when you hear the term ‘PCI?’ Anxiety? Possibly fear? For some, it may be disgust. Most favorably, some may feel a sense confidence or enthusiasm. Ok, I agree that enthusiasm is rarely listed as an emotion felt when hearing the term ‘PCI,’ although there may be someone…

White Paper: Why Penetration Testing Needs Continual Evolution – Going Purple

August 01, 2017 | By:

Download TrustedSec’s white paper: White Paper: Why Penetration Testing Needs Continual Evolution – Going Purple In this white paper you’ll find information detailing the needed changes to typical types of penetration testing. Download now

Highlights from the NIST Cybersecurity Risk Management Conference

November 20, 2018 | By:

NIST hosted a CyberSecurity Risk Management Conference from November 8th through the 10th.  The event was expanded and improved from previous NIST workshops, which were more government focused. Thus for this conference, they wanted the same spirit of gaining stakeholder input on the frameworks and general cybersecurity areas, but with a much greater attendance and…

Holiday Phishing: Office 365

November 15, 2018 | By:

  It’s that time of year again, Merry Phishmas!! Holidays are the prime time of the year for attackers to send Phishing campaigns. Whether you are looking for the best deal on Black Friday, the best Christmas gift for that special family member, or a Holiday greeting from employees, employers, or costumers, there are plenty…

What Information Security Can Learn From the Hospitality Industry

November 06, 2018 | By:

The Information Security industry has a lot in common with the Hospitality industry. Both industries are service oriented, high volume, and built on trust. As with all services founded on trust, establishing and maintaining healthy relationships is critical for success. Strong relationships can do a lot for a security program. They can garner additional funding…

Of Failure and Success

October 30, 2018 | By:

  Experience is simply the name we give our mistakes. — Oscar Wilde   Over the course of a year, I watch many InfoSec conference presentations whether in person at the conference or via a recording on YouTube, I read a multitude of amazing blog articles, and I follow and read the messages of many…

The Three Best Security Analogies I Know (and How to Use Them)

October 29, 2018 | By:

When it goes well, explaining security concepts to coworkers, friends, and family is one of the best parts of being in the security industry. It helps others make more risk-aware decisions, reduces ‘inarticulate tech geek’ stereotypes, and enhances soft-skills. Unfortunately, explanations do not always go well. Audiences need to be in the right state of…

Let’s Build a Card Cloner

October 23, 2018 | By:

This post isn’t attempting to present new research or a new device—that work has already been done, a la Bishop Fox. While an overall design was created, and many others have discussed building such a device, doing so can prove to be challenging. This post will provide you with all that is needed to fully…

A Buyer’s Guide to Beginning SDR

October 22, 2018 | By:

For my first post on software-defined radios (SDRs), I’d like to start off by talking about a few things that most people find out through either experience or spending hours hunting on Google (or never figure out at all, and chalk the problem up to software bugs and hardware gremlins). One thing that I learned…