WKYC Interviews Alex Hamerstone About Seemingly Legit Email Scams

July 27, 2018 | By:

CONSUMER ALERT: Watch for an email scam that seems legit, but fools even the smartest people. What looked to be a normal email from a boss made this employee second guess and avoid a purchasing scam known as “shotgunning”. Watch the full interview here


TrustedSec CEO on Cybersecurity of Vehicles and Building a Better System

July 27, 2018 | By:

Car manufacturers, for the most part, are concerned about risks to the mass fleet, not to one car, said David Kennedy, CEO at TrustedSec. “It’s the technology inside the car that needs to be protected, which means having a team come in and tear apart the system to find the vulnerabilities so that the area…


Alex Hamerstone Addresses Complex IT Infrastructures of Large Companies

July 23, 2018 | By:

Preventing large company data breaches. With the rise of digital technology, businesses are becoming ever more vulnerable. What can be done to prevent large company breaches? GRC Practice Lead, Alex Hamerstone, addresses the challenges that complex IT infrastructures present for the risk of large company data breaches. Read full article HERE


Analyzing USB Fans For Malware From The Trump-Kim Summit

July 17, 2018 | By:

This USB fan isn’t going to be blowing anyone away with viruses. Two TrustedSec Senior Security Consultants analyzed the USB drives given at the Trump-Kim Summit for malware. The conclusion and breakdown show no malware. Read the full article HERE 


Don’t Delay, Migrate Today (Away from SSL/Early TLS)

August 08, 2018 | By:

For those tempted to delay migration away from Secure Sockets Layer (SSL)/early Transport Layer Security (TLS)—don’t wait! This includes all versions of SSL and version 1.0 of TLS (TLS v1.1 and newer are fine). For Payment Card Industry Data Security Standard (PCI-DSS) compliance, you can’t simply migrate sometime before your next PCI audit. Rather, you…


Episode 2.16 It’s all over people! – Your wallet is unhackable but I have your password and more!

August 03, 2018 | By:

  Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Geoff Walton, Rob Simon, Justin Bollinger, and Scot Berner   Show Links: https://twitter.com/Bitfi6 https://krebsonsecurity.com/2018/07/sextortion-scam-uses-recipients-hacked-passwords/ https://www.cybereason.com/blog/wmi-lateral-movement-win32 https://www.cybereason.com/blog/wmi-lateral-movement-win32 https://www.csis.org/analysis/low-hanging-fruit-evidence-based-solutions-digital-evidence-challenge   Tool Time Notes: https://github.com/NetSPI/PowerShell/blob/master/Invoke-ExternalDomainBruteforce.ps1 https://bitbucket.org/grimhacker/office365userenum/src


Top 8 To-Dos for IoT Security

August 01, 2018 | By:

Let’s say you run an operational environment and you’ve spent years figuring out how to keep your production processes and core, life-enabling systems running at high efficiency and efficacy. But now, your IT group wants to connect your production and control systems to outside networks as part of new “IoT” (Internet of Things) initiatives. You…


Webinar – Navigating the Risks & Rewards of Evolution in the Automotive Industry

July 30, 2018 | By:

– JOIN TRUSTEDSEC and MARSH ON September 12th, 2018 AT 2:00 PM EDT – The automotive industry is experiencing a level of change and innovation not seen since the introduction of the passenger car. While this sector has traditionally been dominated by original equipment manufacturers (OEMs) and their suppliers, today it welcomes a host of…


Preparing for (IoT) Segmentation: Six Steps to Get Your Functional Requirements Right

July 12, 2018 | By:

Recently, a client of ours expressed interest in segmenting their existing, flat network. The existence of these types of non-segmented networks is still very prevalent, especially in the manufacturing, supply chain, and medical verticals. The primary reason the organization wished to move on this initiative was in an effort to reduce the scope of their…


How IoT and Digitization Are Driving Renewed Demand for Segmentation

July 11, 2018 | By:

Background The idea of Segmentation is pretty simple: put your crown jewels (i.e. your highest risk assets) in a small container, then heavily secure and monitor that. It is simply too difficult to secure everything equally. Why Now? With “digital” drivers to improve experiences, automate operations or change business models, there is now a need…