Your browser is out of date.

You are currently using Internet Explorer 7/8/9, which is not supported by our site. For the best experience, please use one of the latest browsers.

866.430.2595
Request a Consultation
banner

Subscribe to our blog for the latest industry news.

True Digital Security is a wholly owned member of the Cerberus Sentinel family of companies. View Cerberus Sentinel active blog.

Cerberus Sentinel Blog
True Proudly Supports TU's CTF and CCDC Teams
May 13, 2016 | Steven Anderson

True Proudly Supports TU's CTF and CCDC Teams

True is honored to support the Tulsa community. Since we opened our doors in 2004, that support has taken…

Read More
Day of Caring 2015
Oct 08, 2015 | Kayna Kelley

Day of Caring 2015

For this year's Tulsa Area United Way Day of Caring, True volunteered at the Girl Scouts of Eastern Oklahoma's…

Read More
The DEFCON 2015 Experience - The Interns' Perspective
Oct 07, 2015 | Steven Anderson

The DEFCON 2015 Experience - The Interns' Perspective

What is a "hacker"? Over the years the media has twisted the meaning, so that today it is widely used…

Read More
CSAW: Reverse Engineering for 500, Please.
Sep 22, 2015 | Ryan McCarthy

CSAW: Reverse Engineering for 500, Please.

Toward the end of July, FireEye released a set of CTF-style challenges for their second annual FlareOn…

Read More
CSAW 2015: Crypto 500 - Bricks of Gold Writeup
Sep 22, 2015 | Michael Oglesby

CSAW 2015: Crypto 500 - Bricks of Gold Writeup

This past weekend I participated in the CSAW 2015 CTF on team ascii_overflow. Our team is relatively…

Read More
Mitigating Spear Phishing through Increased Awareness
Jun 05, 2015 | Steven Anderson

Mitigating Spear Phishing through Increased Awareness

To carry out ethical spear phishing attacks in order to help organizations test their security awareness…

Read More
Capture The Flag (CTF) Competitions
Jun 04, 2015 | Ryan McCarthy

Capture The Flag (CTF) Competitions

In the cyber-security realm, arguably one of the best methods of gaining hands-on experience is to compete…

Read More
POODLE Attack on SSL 3.0
May 28, 2015 | Steven Anderson

POODLE Attack on SSL 3.0

The POODLE attack or "Padding Oracle On Downgraded Legacy Encryption" is a fairly recent attack that…

Read More
TLS & SSL Protocols
May 21, 2015 | Steven Anderson

TLS & SSL Protocols

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that are designed…

Read More
Logjam Vulnerability
May 21, 2015 | Steven Anderson

Logjam Vulnerability

The TLS protocol is the current standard for secure communication over the Internet and until now had…

Read More

Get Started with True Digital Security

Request a Consultation