Your browser is out of date.

You are currently using Internet Explorer 7/8/9, which is not supported by our site. For the best experience, please use one of the latest browsers.

866.430.2595
Request a Consultation
banner

Subscribe to our blog for the latest industry news.

True Digital Security is a wholly owned member of the Cerberus Sentinel family of companies. View Cerberus Sentinel active blog.

Cerberus Sentinel Blog
Take a Cue from Healthcare With Cyber SOAP Note
Jul 28, 2022 | Tim Coleman, Vice President of Secured Managed Services at Cerberus Security

Take a Cue from Healthcare With Cyber SOAP Note

In the early 1970s, during the nascent stages of the internet, cybersecurity paralleled the rise of information technology as both a response to perceived security issues and as a concerted effort to better understand computer programming. In fact, the first computer viruses were developed in-house and served as a type of security test. 

Read More
Cerberus Spotlights: Darek Hahn, Chief of Staff
Jul 21, 2022 | Darek Hahn, Chief of Staff at Cerberus Security

Cerberus Spotlights: Darek Hahn, Chief of Staff

Cerberus Spotlights: Darek Hahn, Chief of Staff. Employee Spotlight series invites you to get to know some of our Cerberus Sentinel family.

Read More
Black Box Penetration Test Advantages
Jul 14, 2022 | Rick Belisle, Managing Director at Cerberus Security

Black Box Penetration Test Advantages

Penetration testing, you want to make sure you are selecting the right kind of test to meet your organization’s unique needs.

Read More
What’s in a Name? The Origin of Cyber
Jul 07, 2022 | Jerald Dawkins, PHD, CTO at Cerberus Security

What’s in a Name? The Origin of Cyber

Origin or history of cyber. Most assume the term “cyber” is a portmanteau or blending of two words derived from other words, but it’s not.

Read More
Cybersecurity Checklist for Business Closures, Consolidations, and Acquisitions 
Jun 23, 2022 | Tim Marley, VP of Risk Advisory Services, Cerberus Security

Cybersecurity Checklist for Business Closures, Consolidations, and Acquisitions 

Best practices when a company transitions or expands its network, is to have a cybersecurity checklist to help you lower risk, ensure data integrity, and compliance.

Read More
Unconscious Risk Sharing Consequences and Solutions
Jun 16, 2022 | Chris Clements, VP of Solutions Architecture, Cerberus Security

Unconscious Risk Sharing Consequences and Solutions

Breaches and ransomware happen, but until an attack detonates, all predictions about breach damage and fallout are educated conjecture.

Read More
Connected-medical Devices and the Regulatory Landscape
Jun 09, 2022 | Michael Oglesby, Executive Vice President, Services and Innovation

Connected-medical Devices and the Regulatory Landscape

Within connected devices, a “Wild West” mentality has tended to hold sway except within connected medical devices and equipment.

Read More
The Dangers of Limited Penetration Testing 
May 12, 2022 | Chris Clements, VP of Solutions Architecture, Cerberus Security

The Dangers of Limited Penetration Testing 

Understanding What You Don’t Know About Ethical Hacking, Penetration Testing, and Securing Your IT Environment

Read More
Endpoint Protection: It’s Not Just About Tools
May 05, 2022 | Scott Williamson, VP of Information Services at Cerberus Sentinel

Endpoint Protection: It’s Not Just About Tools

Mitigating the new endpoint risks from increased remote and hybrid working means tools alone aren’t enough for endpoint protection.

Read More
How to Select the Right Monitoring Solution and Avoid Hidden Costs
Apr 28, 2022 | Scott Williamson, VP of Information Services at Cerberus Sentinel

How to Select the Right Monitoring Solution and Avoid Hidden Costs

Monitoring your environment is a basic essential when it comes to developing a mature security program, learn to avoid the hidden costs.

Read More

Get Started with True Digital Security

Request a Consultation