Building Upon Core Security & Risk Definitions

May 07, 2018 | By:

Security is evolving. That’s not news, but as it is happening not everyone can keep up with what that means.  This is especially true for those who have embraced maturing their risk and security programs, while still getting traditional assessments which have become commoditized and oftentimes not as valuable as they used to be.    These…


TrustedSec CEO David Kennedy Weighs In On Twitter’s Plaintext Password Disclosure

May 04, 2018 | By:

Speaking to WIRED, David Kennedy gives his opinion on a new recommendation from Twitter for all users to change their passwords. The recommendation came in light of a disclosure from the company that passwords were recorded internally in plaintext with no encryption. Read the full article here.


Alex Hamerstone explains what it means to clear your “Facebook history” on morning dose

May 04, 2018 | By:

Following Facebook’s personal data privacy scandal, the social networking company announced a new initiative to allow users the ability to wipe their records from the site. Alex Hamerstone went on morning dose to provide some insight into what that will look like for users.


New GDPR Privacy Messages – Alex Hamerstone on morning dose

May 02, 2018 | By:

Have you seen the new privacy language Facebook has rolled out due to GDPR changes? Our GRC practice lead, Alex Hamerstone, breaks down why US users may benefit from European regulation.


Malware: Linux, Mac, Windows, Oh My!

April 26, 2018 | By:

While going through APT write-ups, I’ve been noticing a lot of focus on detecting Windows malware, so we will skip over that. One thing that I haven’t seen much of online, though, is how to hunt for adversaries on Linux systems. For that reason, this blog post will be all about how you can look…


Recording: Ensuring Risk Assessments Have Business Value

April 24, 2018 | By:

JOIN TRUSTEDSEC ON MAY 23rd, 2018 AT 1:00 PM EST There is continuing pressure to keep our information secure and breach-free. At the same time, management often doesn’t see the need of increasing budget if there isn’t an incident occurring or a compliance need. So how does someone in the trenches measure, monitor, and communicate…


It Was the “Summerof2018” – Password Auditing for Windows Administrators

April 19, 2018 | By:

by Costa Petros IT departments around the globe spend countless hours and money ensuring that their company’s data and infrastructure are properly secured. Startup company? Install a firewall and maybe get an antivirus subscription. Past the startup phase? Upgrade your firewall to have an Intrusion Prevention Sensor (IPS) and/or maybe an Intrusion Detection Sensor (IDS)….


GDPR (General Data Protection Regulation) – FAQ

April 18, 2018 | By:

by Jonathan White   My goodness! D-Day, May 25 is right around the corner! GDPR is thought by many to be the regulation of regulations approved in 2016 and scheduled to be enforced by May 25, 2018.  Many customers are still asking, What is GDPR? At a very basic level, GDPR is the General Data…


Episode 2.15 – FTP is still a thing – DNS and Settings Content Files!

July 16, 2018 | By:

Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Ben Tenjamin, Geoff Walton, Chris Prewitt, Justin Bollinger


Episode 2.14 – Zip Slip Slip and split it up to the hip hip hip!

June 07, 2018 | By:

Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Ben Tenjamin, Geoff Walton, Chris Prewitt, Justin Bollinger