TraceSecurity Blog
The latest cybersecurity news, recommendations, and best practices - all in one place
-
Articles
Securing the OSI Model: The Data Link Layer
The Open Systems Interconnection (OSI) model is a conceptual framework used to understand and implement network communications - learn how to secure the data link layer
Read moreNovember 12, 2024
-
Articles
What is Ethical Hacking?
Ethical hacking is one of the most important resources companies can invest in to protect their data.
Read moreNovember 09, 2024
-
Articles
Securing the OSI Model: The Physical Layer
The Open Systems Interconnection (OSI) model is a conceptual framework used to understand and implement network communications - learn how to secure the physical layer
Read moreNovember 05, 2024
-
Articles
Phishing 101
Read moreNovember 04, 2024
-
Articles
What is Web Application Testing?
Applications need to be protected with cybersecurity as much as anything else
Read moreNovember 01, 2024
-
News
FFIEC to Sunset the CAT in 2025
FFIEC announced that they will be sunsetting their free Cybersecurity Assessment Tool in 2025
Read moreOctober 04, 2024
-
Field Diaries
Social Engineering: The New Guy Isn't Bald
Most security awareness training is focused on external threats. But what happens when the threat seemingly comes from within?
Read moreSeptember 16, 2024
-
Articles
What is Cryptography?
Cryptography aims to protect users’ data and information, ensure confidentiality, and prevent cyber criminals from accessing sensitive information.
Read moreSeptember 09, 2024
-
News
What to Know About the Social Security Number Breach
Read moreAugust 26, 2024
-
Articles
Striking a Balance: Cloud and Onsite Storage for Business Continuity
Is cloud storage enough to keep a business up and running when disaster strikes?
Read moreAugust 21, 2024