Your browser is out of date.

You are currently using Internet Explorer 7/8/9, which is not supported by our site. For the best experience, please use one of the latest browsers.

866.430.2595
Request a Consultation
banner

Subscribe to our blog for the latest industry news.

True Digital Security is a wholly owned member of the Cerberus Sentinel family of companies. View Cerberus Sentinel active blog.

Cerberus Sentinel Blog
PCI DSS Standard 4.0
Oct 10, 2019 | Jenna Waters, TRUE Security Consultant

PCI DSS Standard 4.0

The TRUE PCI Services team attended the annual 2019 PCI Community Meeting (PCICM) in beautiful Vancouver…

Read More
How To Protect Data During A Hurricane
Sep 25, 2019 | Lisa Remsa, Marketing Manager

How To Protect Data During A Hurricane

Data Protection for Hurricanes and Natural Disasters Hurricane season is in full swing and, as always,…

Read More
A Game of Thrones: Big Tech’s Legal Reckoning
Sep 11, 2019 | Jenna Waters

A Game of Thrones: Big Tech’s Legal Reckoning

When a hot new tech story broke on my Instagram feed yesterday morning (#MillennialLife), I immediately…

Read More
CCPA Part III: Don't Fight the Tide
Sep 04, 2019 | Lindsey Watts

CCPA Part III: Don't Fight the Tide

California Consumer Privacy Act: SEC.2 (h), an introductory statement giving context to the new privacy…

Read More
Protecting Intellectual Property Part II: VOKSEE Leads the Way in IP Protection
Aug 28, 2019 | Lindsey Watts

Protecting Intellectual Property Part II: VOKSEE Leads the Way in IP Protection

As we explored in the first part of this series, Protecting Intellectual Property Part I, the Trusted…

Read More
Protecting Intellectual Property Part I: Cyber Security Makes Its Way to Hollywood
Aug 21, 2019 | Lindsey Watts

Protecting Intellectual Property Part I: Cyber Security Makes Its Way to Hollywood

“In the modern world, the most valuable asset that any entertainment organization can have is content.…

Read More
Quick and Dirty Disaster Recovery Guide: Part III
Aug 14, 2019 | Lydia Hixon

Quick and Dirty Disaster Recovery Guide: Part III

I had the opportunity to work with one of our clients on a Disaster Recovery tabletop exercise last…

Read More
What Is Phishing & How To Prevent It
Aug 07, 2019 | Jason Manboadh

What Is Phishing & How To Prevent It

Who hasn’t received an email from their boss telling them to get a certain task done quickly? Chances…

Read More
The Importance of Multi-Factor Authentication (MFA)
Jul 31, 2019 | Jenna Waters

The Importance of Multi-Factor Authentication (MFA)

I am not exaggerating when I say that my life is my smartphone. I use it for everything - to email,…

Read More
California Consumer Privacy Act (CCPA): What You Need to Know
Jul 24, 2019 | Jaikob Park

California Consumer Privacy Act (CCPA): What You Need to Know

In the first installment of our series on CCPA, Jenna Waters offered a breakdown of the coming law, and…

Read More

Get Started with True Digital Security

Request a Consultation