Your browser is out of date.

You are currently using Internet Explorer 7/8/9, which is not supported by our site. For the best experience, please use one of the latest browsers.

866.430.2595
Request a Consultation
banner

Subscribe to our blog for the latest industry news. Subscribe

New Study Identifies Top 5 Global Risks: Cyber Risk Index Part II
Feb 10, 2022 | Joshua Brannon, Security Consultant

New Study Identifies Top 5 Global Risks: Cyber Risk Index Part II

In Cyber Risk Index Part 2, Brannon explores Cyber Risk, Infrastructure Risk, Human Capital Risk, and Organization Risk, looking at what we are seeing in global trends and how each can affect your organization.

Read More
Why it Makes Sense to Use a Cybersecurity Partner Instead of a Vendor
Feb 03, 2022 | Sergio Mur, Security Consultant

Why it Makes Sense to Use a Cybersecurity Partner Instead of a Vendor

Vendors make security and compliance recommendations, but leave the work to you. Finding a true security partner to execute tasks brings greater value.

Read More
New Study Identifies Top 5 Global Risks: Cyber Risk Index Part I
Jan 27, 2022 | Joshua Brannon, Security Consultant

New Study Identifies Top 5 Global Risks: Cyber Risk Index Part I

In an attempt to modernize the way we communicate with our business counterparts and leadership boards about risk, a collaboration between the well-known Ponemon Institute and Trend Micro has resulted in the publication of a new study, The Cyber Risk Index (CRI). Researchers were seeking to bridge the gap between preparedness and likelihood of a successful attack.

Read More
Web 3.0, An Interview With Security Expert Jenna Waters
Jan 20, 2022 | Lindsey Watts, VP of Marketing and Solutions

Web 3.0, An Interview With Security Expert Jenna Waters

Semantic Web, or Web 3.0, which leverages blockchain technology and scores of individual nodes to accomplish what the creators of Startup envisioned in their storyline. Writers of that show correctly predicted that such a web would impact 3 key areas – security, privacy, and social structures – in both anticipated and unanticipated ways.

Read More
What is Identity and Access Management and should I be using it?
Jan 13, 2022 | Ed Pickens, TrueIT Engineer

What is Identity and Access Management and should I be using it?

Identity and Access Management lets you set rules for who gets access to your organization’s data.

Read More
Here are the 5 Unmentioned Soft Skills You’ll Need to Pass the OSCP Exam
Jan 06, 2022 | Daniel Bennett, Security Analyst

Here are the 5 Unmentioned Soft Skills You’ll Need to Pass the OSCP Exam

Passing the Offensive Security Certified Professional exam requires more than technical expertise. Master these overlooked skills to up your chances.

Read More
Risky Business – Vendor Risk Management (VRM)
Dec 21, 2021 | Hansol Shin, Security Consultant

Risky Business – Vendor Risk Management (VRM)

Businesses are becoming more dependent on vendors. Working with a vendor comes with great advantages such as getting help from subject matter expert (SME) without having to internally hire full-time employees. Ultimately, this will save the business additional cost, reducing the time it takes to complete tasks, as well as sharing responsibilities and risks associated with tasks performed and service provided by a vendor. While all those advantages will make your life easier and help you stretch resources in a more cost-effective way, there are also disadvantages that you need to consider before jumping into working with a vendor – whether that vendor is a small business or a well-known business.

Read More
Tough Cyber-Insurance Renewal Season May Change How You Approach Internal Security Training
Dec 16, 2021 | Lindsey Watts, VP of Marketing

Tough Cyber-Insurance Renewal Season May Change How You Approach Internal Security Training

TRUE caught up with Vice President of Risk Advisory, Tim Marley, and Cybersecurity Consultant Corey Bolger about upcoming changes to cyber-insurance and trends they are seeing. Their two cents might get you thinking.

Read More
The Dunning-Kruger Effect and Why It Convolutes Cybersecurity
Dec 09, 2021 | Jerald Dawkins, PhD, TRUE Co-founder

The Dunning-Kruger Effect and Why It Convolutes Cybersecurity

Next time you think something is easy and you’re crazy good at it, beware of the Dunning-Kruger (D-K) Effect. Psychology Today describes this as when you mistakenly believe your competence in an area to be high and, therefore, don’t realize you have much to learn. This overconfidence then prevents you from seeking the very knowledge that would help you understand and perform better.

Read More
Water Sector: How Should You Start Assessing Risk and Sharing Threat Information?
Dec 02, 2021 | Michael Oglesby, Executive Vice President of Services and Innovation

Water Sector: How Should You Start Assessing Risk and Sharing Threat Information?

Assessing Risk and Information Sharing (exchanging threat intelligence with others). Both controls rely upon a having a strong knowledge base around how attackers are attacking. The industry terminology for this knowledge is what we call Tactics, Techniques, and Procedures, or TTP for short. Knowing the methods and motivations of real-world attacks requires having a pulse on the global threat landscape and how it impacts individual organizations. Working with vendors who offer security-first products and proactive guidance is a great way to gain direct access to this knowledge.

Read More

Get Started with True Digital Security

Request a Consultation