
True's Executive Roundtable Event Held August 24th
TRUE's latest event brought together a select group of industry thought leaders to discuss various aspects…
Read More
On Centralized Logging and SIEM
The results of the investigation into the recent DigiNotar SSL CA breach reads like a laundry list…
Read More
Making Security Make Sense
Skimming the July issue of MSDN magazine, an article titled "When Security Doesn't Make Sense" by David…
Read More
IT GRC: What Comes First the Program or the Platform?
Perhaps one of the biggest questions facing the leadership of businesses and organizations in today's…
Read More
IT GRC, The Story - How do you do it? - Part 1
I was recently discussing IT GRC program implementation with the CIO of a growing, mid-sized software…
Read More
Getting the most value from your next penetration test
We here at True Digital Security conduct quite a lot of engagements around penetration testing, or "Pen-Tests".…
Read More
When are merchants required to use a PA-DSS validated POS (point-of-sale) application?
In True's experience as a QSA advising merchants with PCI compliance, one point of confusion seems to…
Read More
Solving the Verizon DBIR 2010 Cover Challenge
For the second year in a row, Verizon Business has encoded a "Cover Challenge" in its annual Data Breach…
Read More
More on outbound firewall rules
In a previous article, I mentioned two firewall rules that every network should have: blocking outbound…
Read More
Solving the Verizon DBIR 2011 Cover Challenge ? again
For a third year, Verizon Business has embedded a "Cover Challenge" in its annual Data Breach Investigation…
Read More