Your browser is out of date.

You are currently using Internet Explorer 7/8/9, which is not supported by our site. For the best experience, please use one of the latest browsers.

866.430.2595
Request a Consultation
banner

Subscribe to our blog for the latest industry news.

True Digital Security is a wholly owned member of the Cerberus Sentinel family of companies. View Cerberus Sentinel active blog.

Cerberus Sentinel Blog
Web Application Security
Nov 03, 2011 | Michael Oglesby

Web Application Security

When I ask people what steps they have taken to secure their infrastructure, I get the usual answers. "We…

Read More
Protecting your Digital Assets: A Discussion on the Need for a Data Security and Data Loss Prevention Strategy
Nov 03, 2011 | Jeff Harris

Protecting your Digital Assets: A Discussion on the Need for a Data Security and Data Loss Prevention Strategy

We are pleased to have a guest writer for this month's edition of Security Notes. Written by George Schaefer,…

Read More
Security really isn't Sexy? When It's Done Correctly
Nov 03, 2011 | Jeff Harris

Security really isn't Sexy? When It's Done Correctly

I must admit, in my initial conversations with Jerry about the business of True (at the time DESA) and…

Read More
Threat Sources? Hard Questions about Focusing Your Network Protection
Nov 03, 2011 | Brett Edgar

Threat Sources? Hard Questions about Focusing Your Network Protection

The Verizon Business RISK Team released a very interesting study early in June. The study contained detailed…

Read More
Kids and the Internet
Nov 03, 2011 | Kayna Kelley

Kids and the Internet

I know better than to cross the street without looking both ways or to touch a hot stove top, but these…

Read More
I Make Mistakes
Nov 03, 2011 | Dominic Schulte

I Make Mistakes

Now for a moment of transparency from your friendly information security professional: I make mistakes.…

Read More
Cubicle Fruit
Nov 03, 2011 | Dominic Schulte

Cubicle Fruit

In the last Security Notes, we covered the first of the "3 P's," of information security: perimeter.…

Read More
What gets through your firewall?
Nov 03, 2011 | Brett Edgar

What gets through your firewall?

(Or: How burned is your network?) One of my colleagues noted in an earlier article that there is a common…

Read More
3 P's of Information Security: Perimeter
Nov 03, 2011 | Jerald Dawkins

3 P's of Information Security: Perimeter

In my last article I briefly discussed the three key components, or the "3 P's," of information security,…

Read More
The Importance of an Incident Response Plan
Oct 31, 2011 | Brett Edgar

The Importance of an Incident Response Plan

Most organizations are going to experience a computer security incident each year. Those organizations…

Read More

Get Started with True Digital Security

Request a Consultation