DerbyCon 8.0 EVOLUTION TrustedSec Talks

October 08, 2018 | By:

TrustedSec 2018 Speaker Line-Up Watch the recordings of all our consultants’ talks here: Oddvar Moe Carlos Perez Jason Lang David Boyd Adam Compton Founder and CEO David Kennedy also moderated the Keynote and was on the Opening and Closing Ceremony panels here: Keynote Ceremonies   A proud Platinum sponsor of DerbyCon. Thank you for another amazing…


TrustedSec Podcast Episode 3.3 – Live From DerbyCon 8.0!

October 09, 2018 | By:

TS Podcast 3.3 SHOW NOTES Live from DerbyCon 8.0! Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Geoff Walton, Rob Simon, Justin Bollinger, and Alex Hammerstone Title: Facebook Security Breach Exposes Accounts of 50 Million Users…


TrustedSec CEO David Kennedy on CNN, Facebook Security Breach

October 01, 2018 | By:

Founder and CEO, David Kennedy, discusses Facebook largest data breach in the company’s history on CNN 09/28/2018 Watch Facebook Attack: Security Breach Forces Facebook To Log Out 90million Users


Webinar: vCISO vs CISO – Which is the right path for you?

September 28, 2018 | By:

JOIN TRUSTEDSEC ON Wednesday, October 17th, 2018 AT 1:00 PM EDT Organizations are facing a dangerous combination of mounting cybersecurity threats and a widening gap in the skills required to identify and combat them. There is continuing pressure to keep our information secure and breach-free, and to create leadership roles in the organization to address…


NIST Guidance for Small Business Forthcoming

September 27, 2018 | By:

The National Institute for Standards and Technology, usually referred to as NIST, has many valuable resources, including resources for computer security. The NIST Cybersecurity Framework (NIST CSF) and the NIST 800 series are familiar to most people in the information security industry. The NIST standards are commonly used not only by organizations that are bound…


How Can I Become A Pentester?

September 21, 2018 | By:

After I tell someone that I am a pentester or that I work in InfoSec, the most common question I get asked is if I can help them fix their computer. The second most common question I get is, “How can I become a pentester?” My answer is usually fairly concise and to the point,…


TrustedSec CEO David Kennedy on WSJ podcast, ‘The Future of Everything’

September 20, 2018 | By:

In the latest episode of The Wall Street Journal’s podcast, The Future of Everything, the show tracks hackers compromising voting machines and hear from technologists hoping to safeguard democracy with help from blockchain and mobile voting, to understand if it’s possible for tech to protect our democratic process from foreign interference? Listen to Hack the…


Linux: How’s My Memory

September 18, 2018 | By:

Windows in-memory injection is commonplace in current toolsets, there are quite a few methods to do it, and most of them are documented pretty well. Linux in-memory injection is essentially the same, however, not seen in toolsets quite as much. That is why, for this post, I am going to cover four different open-source methods…


Inc.’s ‘Gray Area’ Video Series features TrustedSec

September 17, 2018 | By:

TrustedSec founder David Kennedy has built a successful company around white hat hacking. His team is hired to test companies’ security weakness — by figuring out how to break into them.


Full Disclosure: Microsoft Lync for Mac 2011 susceptible to forced browsing / download attack

September 13, 2018 | By:

What is it? An attacker can force a user who is logged in with Microsoft Lync for Mac 2011 (< v14.4.3) to browse to a URL of their choice via a specially crafted instant message. This vulnerability exists due to poor input sanitation in the processing of message content submitted via PowerShell and the Lync…