True's Executive Roundtable Event Held August 24th
TRUE's latest event brought together a select group of industry thought leaders to discuss various aspects…
Read MoreOn Centralized Logging and SIEM
The results of the investigation into the recent DigiNotar SSL CA breach reads like a laundry list…
Read MoreMaking Security Make Sense
Skimming the July issue of MSDN magazine, an article titled "When Security Doesn't Make Sense" by David…
Read MoreIT GRC: What Comes First the Program or the Platform?
Perhaps one of the biggest questions facing the leadership of businesses and organizations in today's…
Read MoreIT GRC, The Story - How do you do it? - Part 1
I was recently discussing IT GRC program implementation with the CIO of a growing, mid-sized software…
Read MoreGetting the most value from your next penetration test
We here at True Digital Security conduct quite a lot of engagements around penetration testing, or "Pen-Tests".…
Read MoreWhen are merchants required to use a PA-DSS validated POS (point-of-sale) application?
In True's experience as a QSA advising merchants with PCI compliance, one point of confusion seems to…
Read MoreSolving the Verizon DBIR 2010 Cover Challenge
For the second year in a row, Verizon Business has encoded a "Cover Challenge" in its annual Data Breach…
Read MoreMore on outbound firewall rules
In a previous article, I mentioned two firewall rules that every network should have: blocking outbound…
Read MoreSolving the Verizon DBIR 2011 Cover Challenge ? again
For a third year, Verizon Business has embedded a "Cover Challenge" in its annual Data Breach Investigation…
Read More