Your browser is out of date.

You are currently using Internet Explorer 7/8/9, which is not supported by our site. For the best experience, please use one of the latest browsers.

866.430.2595
Request a Consultation
banner

Subscribe to our blog for the latest industry news.

True Digital Security is a wholly owned member of the Cerberus Sentinel family of companies. View Cerberus Sentinel active blog.

Cerberus Sentinel Blog
Why Everyone Should Be Using a Web Proxy
Aug 31, 2012 | Brett Edgar

Why Everyone Should Be Using a Web Proxy

If you haven't heard about it by now, let me clue you in: Java is a security nightmare. A few days ago,…

Read More
On Key Management and Tokenization
Aug 17, 2012 | Jerald Dawkins

On Key Management and Tokenization

I often get into debates on the use of encryption and it being the panacea of data protection. While…

Read More
DefCon 20 Recap
Aug 17, 2012 | Jason Staggs

DefCon 20 Recap

Jason Staggs is a current participant in True's formal internship program and attended DefCon20 as part…

Read More
U.S. Navy Contracts to Build Tools for Extracting Info from Video Game Systems
Jun 07, 2012 | Jason Staggs

U.S. Navy Contracts to Build Tools for Extracting Info from Video Game Systems

Before deciding to participate in your favorite online games, you might be interested to know what the…

Read More
Troubleshooting Forensic Drive Imaging and 'Advanced Format' (4K Cluster) Drives
Jun 05, 2012 | Brett Edgar

Troubleshooting Forensic Drive Imaging and 'Advanced Format' (4K Cluster) Drives

In the course of a recent incident response engagement, I ran into a hard-to-track-down problem involving…

Read More
When A Credit Card Payment Processor Gets Hacked
Apr 04, 2012 | Valerie Jacobi

When A Credit Card Payment Processor Gets Hacked

Not to make light of the gravity of the event, but here we go again - Consumers are subjected to another…

Read More
On Stuxnet Adaptation
Mar 21, 2012 | Andrew Ridings

On Stuxnet Adaptation

With the recent focus on Stuxnet due to the CBS 60 Minutes Special: Stuxnet: Computer worm opens new…

Read More
MS12-020 Proof-of-Concept in the Wild
Mar 19, 2012 | Brett Edgar

MS12-020 Proof-of-Concept in the Wild

Well, that didn't take long. As of Thursday, an MS12-020 PoC (the Remote Desktop Protocol vulnerability)…

Read More
Increase Windows Network Security Through Group Policy Software Installations
Mar 14, 2012 | Brett Edgar

Increase Windows Network Security Through Group Policy Software Installations

Seeing the rate at which companies have been successfully attacked by Java exploits while their users…

Read More
Remote Desktop Vulnerability (MS12-020) Is the Worst of the Worst
Mar 13, 2012 | Brett Edgar

Remote Desktop Vulnerability (MS12-020) Is the Worst of the Worst

The MS12-020 vulnerability for which Microsoft released a patch yesterday is about as bad as you can…

Read More

Get Started with True Digital Security

Request a Consultation