/assets/images/CISO logo 2-color cropped.png Blog | True Digital Security

Your browser is out of date.

You are currently using Internet Explorer 7/8/9, which is not supported by our site. For the best experience, please use one of the latest browsers.

866.430.2595
Request a Consultation
banner

Subscribe to our blog for the latest industry news.

True Digital Security is a wholly owned member of the Cerberus Sentinel family of companies. View Cerberus Sentinel active blog.

Cerberus Sentinel Blog
True's Executive Roundtable Event Held August 24th
Sep 23, 2011 | Kayna Kelley

True's Executive Roundtable Event Held August 24th

TRUE's latest event brought together a select group of industry thought leaders to discuss various aspects…

Read More
On Centralized Logging and SIEM
Sep 23, 2011 | Brett Edgar

On Centralized Logging and SIEM

The results of the investigation into the recent DigiNotar SSL CA breach reads like a laundry list…

Read More
Making Security Make Sense
Sep 21, 2011 | Michael Oglesby

Making Security Make Sense

Skimming the July issue of MSDN magazine, an article titled "When Security Doesn't Make Sense" by David…

Read More
IT GRC: What Comes First the Program or the Platform?
Sep 21, 2011 | Tommy Thompson

IT GRC: What Comes First the Program or the Platform?

Perhaps one of the biggest questions facing the leadership of businesses and organizations in today's…

Read More
IT GRC, The Story - How do you do it? - Part 1
Sep 21, 2011 | Tommy Thompson

IT GRC, The Story - How do you do it? - Part 1

I was recently discussing IT GRC program implementation with the CIO of a growing, mid-sized software…

Read More
Getting the most value from your next penetration test
Sep 21, 2011 | Michael Oglesby

Getting the most value from your next penetration test

We here at True Digital Security conduct quite a lot of engagements around penetration testing, or "Pen-Tests".…

Read More
When are merchants required to use a PA-DSS validated POS (point-of-sale) application?
Sep 21, 2011 | Michael Oglesby

When are merchants required to use a PA-DSS validated POS (point-of-sale) application?

In True's experience as a QSA advising merchants with PCI compliance, one point of confusion seems to…

Read More
Solving the Verizon DBIR 2010 Cover Challenge
Sep 21, 2011 | Michael Oglesby

Solving the Verizon DBIR 2010 Cover Challenge

For the second year in a row, Verizon Business has encoded a "Cover Challenge" in its annual Data Breach…

Read More
More on outbound firewall rules
Sep 21, 2011 | Brett Edgar

More on outbound firewall rules

In a previous article, I mentioned two firewall rules that every network should have: blocking outbound…

Read More
Solving the Verizon DBIR 2011 Cover Challenge ? again
Sep 21, 2011 | Michael Oglesby

Solving the Verizon DBIR 2011 Cover Challenge ? again

For a third year, Verizon Business has embedded a "Cover Challenge" in its annual Data Breach Investigation…

Read More

Get Started with True Digital Security

Request a Consultation