We share our expertise to make the world a safer place.
InfoSec moves at a rapid pace and sometimes it’s hard to keep up—that’s where we enter the chat.

Discover current cybersecurity insights
Get vital information straight from the experts, without all the noise.

InfoSec World Workshop - Adversary Tactics and Threat Hunting
This immersive workshop will train you to simulate attacks, hunt threats, and build detections using manual, automated, and AI-driven methods across network…

Incident Response: Lessons From the Front Lines
IR Practice Lead Carlos Perez will draw from recent, anonymized investigations to expose the most devastating failure patterns our Incident Response team has…

PCI P2PE vs. E2EE – Scoping it Out
Many payment processors sell “End-to-End Encryption” (E2EE) payment terminals with slick marketing that describes how well the solution protects payment card…

Security Noise - Cybersecurity Awareness Month 2025
In this episode, we are talking cybersecurity awareness with Alex Hamerstone! This discussion covers authentication practices, compliance, IoT, and scams using…

HIPAA Applicability - Understanding the Security, Breach Notification, and Privacy Rules
This post is intended to help organizations understand how the Health Insurance Portability and Accountability Act (HIPAA) Security, Breach Notification, and…

CMMC NOPE: Why You Don’t Need to be CMMC Compliant
As a Cybersecurity Maturity Model Certification Registered Practitioner Organization (CMMC-RPO), TrustedSec fields many requests from organizations looking for…

Automating Penetration Testing With Bash
Join Principal Security Consultant Adam Compton to discover how Bash can automate penetration testing tasks by streamlining the tedious, simplify workflows,…

HIPAA Business Associates - What’s Your Function?
Many teams working with health care providers receive requests to sign a Business Associate Agreement. In this blog, we break down HIPAA’s definition of a…

Security Noise - Can You Wear a White Hat After Labor Day?
Episode 8.2

HIPAA Covered Entities - It’s More Than Just PHI
Handling health records doesn’t automatically make an organization a Covered Entity. In this blog, we help clear up common misconceptions so teams can better…

WSUS Is SUS: NTLM Relay Attacks in Plain Sight
Windows Server Update Services (WSUS) is a trusted cornerstone of patch management in many environments, but its reliance on HTTP/HTTPS traffic makes it a…

The One Step Most Organizations Miss with Active Directory
Join Identity Security Architect Sean Metcalf and Managing Director of Remediation Services Paul Sems to get perspective on how leading organizations are…
Loading...
Get our best blogs, latest webinars, and podcasts sent to your inbox.
Our monthly newsletter makes it easy to stay up-to-date on the latest in security.
