Latest Security Flaw at Facebook

March 22, 2019 | By:

Listen to the full episode of The Simi Sara Show “Latest Security Flaw at Facebook Believed to Impact Between 200m and 600m Users.” here.D For years, users’ passwords were stored in a text document, which could have been opened by anyone who had internal access to files – that’s as many as 20,000 staff. Guest: Alex…


Nation-States Have Right to Hack Back, Survey Says

March 22, 2019 | By:

Security professionals who attended RSA 2019 believe that the world is in the midst of cyber-war, according to a survey conducted by Venafi. GRC Practice Lead Alex Hamerstone tells Infosecurity Magazine that “cyber-war” as a term is often used to loosely. Read the full results and opinions in the article here.


TrustedSec Podcast Episode 3.11 (For Workgroups) – Ghidra, Citrix and Beto Oh My!

March 22, 2019 | By:

Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Geoff Walton, Rockie Brockway, Steve Maxwell, Hans Lakhan, and David Boyd Title: Iranian-backed hackers stole data from major U.S. government contractor  URL: https://www.nbcnews.com/politics/national-security/iranian-backed-hackers-stole-data-major-u-s-government-contractor-n980986 Author: Dan De Luce and…


Five Thoughts on Securing Multi-Cloud Environments

March 19, 2019 | By:

As its name suggests, a multi-cloud environment is a network that utilizes the services of more than one cloud provider. There are many different ways that multi-cloud infrastructures can be designed and a primary topic of discussion is how to properly secure these environments.  No single cloud service provider has the best environment for every…


A Local Bomb Threat Connected to Online Gaming Has Parents on Edge

March 15, 2019 | By:

GRC Practice Lead Alex Hamerstone spoke with News 5 about parents’ concerns and what to be aware of in the online gaming world. Watch the full news clip here.


Webinar: Simulating a Cyber Attack – Table-Top Best Practices

March 14, 2019 | By:

Practice? We’re talking about practice?! Cyber attacks are an organizational concern. In order to build an effective security program, it’s impossible to rely on “best practice” policies without testing and vetting them to see if they work. Penetration tests will only go so far and only deal with the technical aspects of preventing a breach….


Top Six Security and Risk Management Questions

March 12, 2019 | By:

Recently, Gartner put out a report on the top 10 inquiries regarding security projects. The report is based on their analysis of over 10,200 client interactions covering relevant security and risk management topics from July 2018 through January 2019 (see the research here). Interestingly enough, Trustedsec has heard similar inquiries regarding product offerings in discussions…


U.S. Security Experts Sound Off on Huawei

March 09, 2019 | By:

CEO Dave Kennedy chimes in about Huawei saying “The big question is why are we investing substantial amount of money and infrastructure in a company that has in the past stolen intellectual property from the United States [and] Europe-based companies in an effort to promote their own.” Read Yahoo! Finance’s full article “‘Really bad business…


The Current Cyber Security Trends in 2019

March 07, 2019 | By:

In this discussion, Stephen Marchewitz, Director of Risk, is sharing Cyber Security News and the trends we’re seeing in 2019 so far. Listen to the full conversation here. As the information security industry continues to mature, several things have changed, but many of the fundamental issues remain—even in the face of new technologies, threats, and…


Research Suggests New Chinese Hacking Effort For Maritime Technology

March 05, 2019 | By:

TrustedSec CEO David Kennedy joined Cavuto Coast to Coast on Fox Business to discuss a new report detailing alleged Chinese efforts to hack American Universities for maritime intelligence.