
CISA Suggests That Organizations Use the Most Recent Version of Google Chrome
Blog Users and administrators should update to a new version of Chrome released by Google last week to address seven flaws in the browser, according to the US Cybersecurity and Infrastructure Agency (CISA). Google published an advisory on January 6, 2019....

Beware the ‘Secret Agent’ Cloud Middleware
Last Thursday, at RSA Conference in San Francisco, the researchers from Wiz.io unveiled an open-source cloud middleware database on GitHub that details the particular middleware agents that Amazon Web Services (AWS), Google, and Microsoft put on their cloud customers'...

Catchpoint Achieves ISO/IEC 27001:2013 Certification Streamlined by TrustNet
Catchpoint®, the worldwide leader in digital experience observability, announced today that it has successfully completed ISO/IEC 27001:2013 accreditation. TrustNet – global cybersecurity and compliance service provider, helped streamline the formal audit procedure...

What is a SOC 1 report?
A SOC 1 report is an evaluation of a company's internal controls related to financial reporting. The purpose of a SOC 1 report is to give organizations comfort that their service providers have adequate controls and procedures in place to protect their data and...

TrustNet Wins “Editor’s Choice in Managed Security Service Provider (MSSP)” at #RSAC 2022
Blog SAN FRANCISCO (BUSINESSWIRE) JUNE 6, 2022 – TrustNet is proud to announce we have won the following award from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine: “Editor’s Choice in Managed Security Service...

Biometric Data Provides Increased Security, There Are Risk Factors
As the use of biometric data becomes more widespread, it is important to consider the potential risks associated with its use. While biometric data can provide increased security, there are a number of factors that should be considered when using this type of data....

ChromeLoader Browser Hijacker Provides Gateway to Bigger Threats
Although ChromeLoader may appear to be a run-of-the-mill browser hijacker that merely reroutes users to advertising sites, its use of PowerShell might represent a greater danger by allowing for further and more sophisticated malicious activity such as the spread of...

Follina: A New Microsoft Zero-Day Attack is Now Underway
Worried about fraud, employers are shifting to authentication technologies that are both secure and user-friendly. But there's a catch. Adversaries are actively exploiting a readily exploitable vulnerability in the Microsoft Support Diagnostic Tool (MSDT) in Windows,...

PCI DSS 3.1: In Review of the Old Standard
Blog The PCI DSS is a set of security standards created by the Payment Card Industry Security Standards Council (PCI SSC). The council was formed by the major credit card companies (Visa, MasterCard, Discover, American Express, and JCB) in 2006 to establish...

PA DSS vs. PCI DSS: Understanding the Differences
Blog Businesses that process, store, or transfer credit card data must adhere to the rules of the two main compliance frameworks in the payments sector: PCI DSS and PA DSS. Software suppliers who create point-of-sale (POS) apps that take credit card...