Your browser is out of date.

You are currently using Internet Explorer 7/8/9, which is not supported by our site. For the best experience, please use one of the latest browsers.

866.430.2595
Request a Consultation
Scroll to Explore
banner

Keeping Attackers Out of Your Cloud: MSSP Alert Response, Part II

Put yourself in the role of being a professional attacker. It’s a job, like anything else, so you’d want to get the most result for your effort in

Get Started
PCI DSS Standard 4.0
Oct 10, 2019 | Jenna Waters, TRUE Security Consultant

PCI DSS Standard 4.0

The TRUE PCI Services team attended the annual 2019 PCI Community Meeting (PCICM) in beautiful Vancouver…

Read More
Hurricane Season 2019: Be Prepared and Protected
Sep 25, 2019 | Lisa Remsa, Marketing Manager

Hurricane Season 2019: Be Prepared and Protected

Hurricane season is in full swing and, as always, it's a doozy. And while keeping your business safeguarded…

Read More
A Game of Thrones: Big Tech’s Legal Reckoning
Sep 11, 2019 | Jenna Waters

A Game of Thrones: Big Tech’s Legal Reckoning

When a hot new tech story broke on my Instagram feed yesterday morning (#MillennialLife), I immediately…

Read More
CCPA Part III: Don't Fight the Tide
Sep 04, 2019 | Lindsey Watts

CCPA Part III: Don't Fight the Tide

California Consumer Privacy Act: SEC.2 (h), an introductory statement giving context to the new privacy…

Read More
Protecting Intellectual Property Part II: VOKSEE Leads the Way in IP Protection
Aug 28, 2019 | Lindsey Watts

Protecting Intellectual Property Part II: VOKSEE Leads the Way in IP Protection

As we explored in the first part of this series, Protecting Intellectual Property Part I, the Trusted…

Read More
Protecting Intellectual Property Part I: Cyber Security Makes Its Way to Hollywood
Aug 21, 2019 | Lindsey Watts

Protecting Intellectual Property Part I: Cyber Security Makes Its Way to Hollywood

“In the modern world, the most valuable asset that any entertainment organization can have is content.…

Read More
Quick and Dirty Disaster Recovery Guide: Part III
Aug 14, 2019 | Lydia Hixon

Quick and Dirty Disaster Recovery Guide: Part III

I had the opportunity to work with one of our clients on a Disaster Recovery tabletop exercise last…

Read More
Gone Phishin’
Aug 07, 2019 | Jason Manboadh

Gone Phishin’

Who hasn’t received an email from their boss telling them to get a certain task done quickly? Chances…

Read More
SMS Verification Codes: We Need to Stop Being Basic about MFA
Jul 31, 2019 | Jenna Waters

SMS Verification Codes: We Need to Stop Being Basic about MFA

I am not exaggerating when I say that my life is my smartphone. I use it foreverything - to email,…

Read More
California Consumer Privacy Act (CCPA): What You Need to Know
Jul 24, 2019 | Jaikob Park

California Consumer Privacy Act (CCPA): What You Need to Know

In the first installment of our series on CCPA, Jenna Waters offered a breakdown of the coming law, and…

Read More

Get Started with True Digital Security

Start Protecting Your Business’s Data and Have Digital Security Preparedness. Whether you need to build a Security Incident Response Plan or have experienced.

Request a Consultation