TruBlog

Critical Security Information For Security Conscious Companies

Email Us - 877.583.2841 - Request A Demo

Use This Form To Have A TruShield Team Member Contact You With More Information.

  • This field is for validation purposes and should be left unchanged.

Use This Form To Contact TruShield Inc Directly. Or you can call us at: 877.583.2841. We will respond back as quickly as possible!

Making the Most of Your SIEM Security From the Beginning

Making the Most of Your SIEM Security From the Beginning

As the complexity of your company’s digital network grows, Security Information and Event  Management, or rather SIEM technology, can significantly help support your IT team with the viewpoint they need to ensure compliance and operations support for the successful continuation of the business. Unfortunately, with great power comes great pain points and problems. I sat down with Paul Caiazzo, Founder and Chief Security Architect of TruShield, to talk about the common blunders he sees when company’s DIY SIEM integrations and here is what I found out.

Continue Reading

Reasons Why Cybersecurity is an Ongoing Project

Set it and forget it! While this sounds like something from an infomercial, unfortunately, this is often the mindset that many organizations have when developing their cybersecurity strategy. Fundamentally flawed, stupendously short-sighted and remarkably reckless, here are three common mistakes which highlight why cybersecurity is (wrongly) viewed as a one-time-deal rather an ongoing project. Continue Reading

You Were Warned About NotPetya Ransomware

On June 27th, organizations across the globe discovered a new ransomware danger now pegged as NotPetya. This variant of new ransomware was initially thought to be a repackaged version of the Petya ransomware variant discovered about two months ago but has since been found to only borrow code from that variant, with modifications to increase its impact.  At… Continue Reading

Cybercriminals are Targeting Law Firms

It’s no secret that the legal industry is now recognized as one of the biggest targets for cybercriminals today. Clients trust you with their private information and believe that you will keep it safe. In a PwC report entitled, Safeguarding Your Firm From Cyber Attacks, they note, “Privacy and confidentiality are bedrock qualities for law firms. The theft… Continue Reading

Brace Yourself for Another Ransomware Sh*tstorm

As the world sifts through the ashes left from the cybersecurity firestorm brought down on it over the weekend by a ransomware strain known as WannaCry, a new menace is growing from its shadows. This new ransomware comes from similar origins, an NSA exploit dump by Shadow Brokers.  While WannaCry used a weaponized exploit called… Continue Reading

Keeping Your Data Safe from WannaCry Ransomware

On Friday, May 12th, a flurry of activity was recorded in worldwide security operation centers (commonly referred to as SOCs) as cybersecurity specialists sprung into action across the globe. As you’ve probably heard, WannaCry was the reason the alarm bells started ringing, setting the stage for some very long weekends for IT and Security professionals… Continue Reading

The Developing Dangers of SCADA Systems

Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities in America, as well as in other countries. These devices are a part of the nation’s critical infrastructure and should be protected from the growing and evolving list of security threats that exist today.… Continue Reading

The Vulnerabilities of the President’s Twitter

By now, you have probably heard about how our fearless commander-in-chief is utilizing an outdated Android device, and maybe it makes you wonder if he has already been hacked.  Along the same lines, you might think his Twitter account is already potentially compromised (did you catch his thoughts on the whole Russia hacking topic?).  Here to speak… Continue Reading

Copyright © 2017