How Insurers Can Build an NAIC-Ready Cybersecurity Program

READ MORE +

What is the Best Phishing Defense? A Good Offense.

READ MORE +

Why SIEM Deployment Is So Difficult

Many organizations are attempting to deploy a SIEM (Security Information and Event Management) capability, but few do it well. Organizations often

READ MORE +

What is the Difference between EMV and PCI Compliance?

It might be a surprise to some that EMV (Europay, MasterCard, and Visa) compliance is not associated with Payment Card Industry Data Security

READ MORE +

What the Meltdown and Spectre CPU Vulnerabilities Mean to You

Meltdown and Spectre require that you put aside standard maintenance schedules and weekly patching windows in favor of emergency out-of-band

READ MORE +

True Day of Caring 2017

Our True team had an excellent time at the Tulsa Area United Way Day of Caring this year, building privacy stalls for the pool facilities at Camp

READ MORE +

True to Present at Information Warfare Summit 10 Conference

You won’t want to miss True’s sessions at the upcoming Oklahoma Infragard Information Warfare Summit 10 on Thursday, November 2nd!  True prides

READ MORE +

New Employee Announcement

In our industry, roles are constantly being redefined and revolutionized. TRUE believes in constant innovation and growth, and we are always forging

READ MORE +

September 2017 PCI Guidance for Penetration Testing and Mobile Payment Applications

Last week, the PCI council published updated guidance on Penetration Testing and Mobile Payment Applications.  Here is a quick overview of the

READ MORE +

What Consumers Need to Know about Skimmers

What are credit card skimmers? There are many ways thieves can steal your data and money.  Credit and debit cards are a particularly hot commodity

READ MORE +
1 2 3 4 5