We share our expertise to make the world a safer place.
InfoSec moves at a rapid pace and sometimes it’s hard to keep up—that’s where we enter the chat.

Discover current cybersecurity insights
Get vital information straight from the experts, without all the noise.

Ask Me Anything: Mobile Security
Expert panel shares latest mobile testing techniques, vulnerabilities, and strategies to secure mobile apps from sophisticated threats, protecting your mobile…

Ask Me Anything: Advanced Cloud Pen Testing Scenarios
Join TrustedSec Force Cloud Security Practice Lead Paul Burkeland, along with Principal Security Consultant Mike Felch and Security Consultants Edwin David and…

Calculating Business Impact
Join TrustedSec's Rockie Brockway to learn how to measure Business Impact, quantify financial, operational, and reputational losses, and establish a…

Understanding and Documenting PCI DSS Scope
As new PCI DSS guidance emerges, the expectations placed on auditors and the entities they assess are evolving. New requirement 12.5.2 defines scope…

Ask Me Anything: Proactive Threat Hunting
As threat actors become more sophisticated, organizations' approaches to finding malicious activity must become more proactive and refined. Dive into the…

Specula: A Red Team Chronicle
Microsoft Outlook is often used as the primary email client in corporate environments, making it a high-value target for threat actors. Any potential to…

Ask Me Anything: Remediation
Customize and optimize your Linux system with our trusted solutions, ensuring security and performance with expert knowledge and support.

Effective Security Logging: What and How to Monitor for Security Issues
Join industry experts Megan Nilsen and Carlos Perez for a comprehensive guide on security logging, identifying critical events, and strengthening defenses…

Ask Me Anything: Software Security
While many are confident in the security of their software, absolute protection is never guaranteed. Attackers' toolkits are growing, and those who don't keep…

Ask Me Anything: Exploring Assumed Breach Strategies for Cyber Resilience
assumed breach

Preparing for NIST CSF 2.0: Practical Tips for Implementation
TrustedSec’s Senior Security Consultant Jared McWherter and Advisory Solutions Director Alex Hamerstone provide actionable advice for aligning your…

Ask Me Anything: Unraveling the Layers of Microsoft 365 Incident Response
Join Senior IR Consultant, Shane Hartman and Senior Security Consultant, Steven Erwin as they equip you with the knowledge and insights needed to navigate the…
Loading...
Get our best blogs, latest webinars, and podcasts sent to your inbox.
Our monthly newsletter makes it easy to stay up-to-date on the latest in security.
