Your browser is out of date.

You are currently using Internet Explorer 7/8/9, which is not supported by our site. For the best experience, please use one of the latest browsers.

866.430.2595
Request a Consultation
banner

Subscribe to our blog for the latest industry news.

True Digital Security is a wholly owned member of the Cerberus Sentinel family of companies. View Cerberus Sentinel active blog.

Cerberus Sentinel Blog
Cybersecurity Trends in Energy Part II: Why Are Oil & Gas Professionals So Upset Over New Guidelines?
Nov 04, 2021 | Jerald Dawkins, PhD, TRUE Co-founder

Cybersecurity Trends in Energy Part II: Why Are Oil & Gas Professionals So Upset Over New Guidelines?

In our last installment, we explored the escalation of threats to U.S. water facilities. Follow our whole Energy series for insights into trends across infrastructure, cyber threats, and regulations as electric, oil & gas, and water facilities are developing a very familiar pattern. CISOs carry the burden of needing to protect their organizations’ integrity and business continuity, but often with less budget than they need. So, you would think that after TSA announced a second set of escalated cybersecurity requirements for key pipelines and liquified natural gas (LNG) companies, CISOs would welcome this. Why is it causing so many waves?

Read More
Policy Development
Oct 28, 2021 | Randy Griffith, Senior Security Consultant

Policy Development

Policy? We ain’t got no policy? We don’t need no policy! I don’t have to show you any stinking policy! This play on a quote from the 1948 film The Treasure of the Sierra Madre perfectly captures how many organizations approach policy development, but they might change their minds if they understood how vital policy is to their organization. Simply defined, a policy is just a guideline that governs actions and processes within your organization. All policies should be aligned with your organization’s requirements and business goals, and they should be written down to help guide decisions or achieve an intended outcome. For example, your board may not want people who have been convicted of fraud or embezzlement working in the finance department, with access to corporate bank accounts and the ability to transfer money.

Read More
As Energy Sector Modernizes, Water Facilities Mitigate New Risk
Oct 21, 2021 | Michael Oglesby, Executive Vice President of Services and Innovation

As Energy Sector Modernizes, Water Facilities Mitigate New Risk

On February 5, 2021, an unknown cyber attacker hacked into a water treatment facility in Florida, prompting alarm among energy providers who use Industrial Control Systems (ICS). This facility, much like many other water facilities across the country, had embraced modern digital technologies, connecting more and more industrial control systems   (ICS) and internet of industrial things (IIoT) to corporate and remote networks. The goal of connecting systems is to support better efficiencies and modernize aging computing infrastructures.

Read More
6 Reasons Why Microsoft 365 Backup is Critical
Oct 14, 2021 | David Beiser, IT Engineer

6 Reasons Why Microsoft 365 Backup is Critical

Six critical reasons to protect your Microsoft 365 data with timely backups and TRUE digital support.

Read More
Rush to the Cloud is Driving Growth, and New Trends in Cybersecurity
Oct 07, 2021 | Heath Gieson, ‪VP Operations

Rush to the Cloud is Driving Growth, and New Trends in Cybersecurity

With so many companies having sped up their digital transformation processes, there’s no reason not to just lean into them full-tilt, and CFOs are at the front of this race. It would appear that to support growth through creative business models that are built to survive a pandemic (or whatever else comes our way), CFOs are continuing to increase investments into digital transformation initiatives that create new revenue streams.

Read More
How Much Damage Can be Done While You’re Still Investigating Alerts?
Sep 29, 2021

How Much Damage Can be Done While You’re Still Investigating Alerts?

Most organizations, especially in the tech and midmarket spaces, receive spending approval to buy security tools, but minimal budget for additional people to manage them. This is like rush hour at the grocery store with only 1 lane open. There are only so many transactions that can be processed that way. Ideally, some of those transactions could be automated, and for those that can’t, every aisle should be open. It’s the same for your security teams and alerts. No alert, or “transaction”, can be overlooked, but when your people get overwhelmed, some of them are bound to slip through, allowing attackers to fly under the radar. I want to examine an attack from both sides– the attacker, and the responder.

Read More
TRUE Ranks 90 in the World for 2021 Cybersecurity Award
Sep 23, 2021

TRUE Ranks 90 in the World for 2021 Cybersecurity Award

We are proud to announce that True Digital Security has climbed in global rankings from 100th to 90th in MSSP Alert’s annual analysis. With more nominations than ever before, this year's applicants spanned 26 countries and were ranked by 3 key criteria: size of in-house cyber-expert teams, quality of cybersecurity offerings, and overall annual program revenue, profitability, and growth. While TRUE is pleased to have risen in such an elite list, we are most thankful for what that growth means to our clients.

Read More
ROI Matters: Fuel Your Organization’s Growth with a Mature Cybersecurity Program
Sep 16, 2021 | Jerald Dawkins, PhD, TRUE Co-founder

ROI Matters: Fuel Your Organization’s Growth with a Mature Cybersecurity Program

Cybersecurity maturity impacts your revenue. Learn how to foster revenue growth with mature security protocols.

Read More
Microsoft Defender Advanced Threat Protection - Remediation and Exceptions
Sep 09, 2021 | Will Gray, IT Engineer

Microsoft Defender Advanced Threat Protection - Remediation and Exceptions

As recently as 3 years ago, it Microsoft’s security options were helpful, but sometimes challenging for IT professionals to navigate. With licensing updates and some simplification, as well as marked improvements to capabilities, it’s definitely time to give the Microsoft security suite another look. Specifically, their latest iteration of Defender Endpoint and Security has undergone a major overhaul with its built-in, cloud powered Advanced Threat Protection.

Read More
Don’t Leave Holes in Your Safety Net: 3 Steps to Strengthen Your Business Continuity Plan
Sep 01, 2021 | Scott Williamson, VP of Information Services

Don’t Leave Holes in Your Safety Net: 3 Steps to Strengthen Your Business Continuity Plan

Disruption of mission critical applications would mean delayed service delivery, lost productivity, lost profits, and a lot of other headaches you don’t want. That’s exactly why you are probably already doing backups and have a BCDR plan in place. The question is not whether or not you have solutions. Of course you do. The question is, have you done everything necessary to ensure those plans and solutions won’t fail you in your moment of need? 

Read More

Get Started with True Digital Security

Request a Consultation