inblog logo
|
Trescudo Blog
  • Main Home

Trescudo Blog

Explore the latest in cybersecurity with the Trescudo blog. Our experts provide in-depth analysis on threat intelligence, risk management, and compliance challenges in cloud, OT, and endpoint security. Additionally, you can find various guides, briefs and reports under the Resources menu item of our main website - https://trescudo.com
See AllCompliance & RiskIndustry VerticalsProducts & SolutionsCybersecurity StrategyBreach AnalysesThreat Analysis
Kindness, Trust, and Zero-Trust

Kindness, Trust, and Zero-Trust

Human-centered security for EU/NIS2: how kindness, psychological safety, and zero-trust cut MTTR, boost phishing reporting, and strengthen breach communications.
Ev
Nov 12, 2025
Cybersecurity Strategy
New Enterprise Attack Vector

New Enterprise Attack Vector

Voice assistants like Siri & Alexa are a new enterprise attack vector. Our analysis covers the "Dolphin Attack," malicious skills, and a CISO playbook for this emerging threat.
Ev
Sep 19, 2025
Cybersecurity Strategy
Data Security: AI Personas

Data Security: AI Personas

What if the person you're talking to isn't real? Discover how AI personas create new insider threats and why Data Security with DLP and XDR is your best defence.
Ev
Jul 19, 2025
Cybersecurity Strategy
Zero‑Trust Security Architecture

Zero‑Trust Security Architecture

Learn how zero‑trust security architecture, micro‑segmentation and identity‑centric security stop lateral movement, meet DORA/NIS2, and cut breach costs by 40 %.
Ev
Jul 15, 2025
Cybersecurity Strategy
Kindness, Trust, and Zero-Trust

Kindness, Trust, and Zero-Trust

Human-centered security for EU/NIS2: how kindness, psychological safety, and zero-trust cut MTTR, boost phishing reporting, and strengthen breach communications.
Ev
Nov 12, 2025
Cybersecurity Strategy
New Enterprise Attack Vector

New Enterprise Attack Vector

Voice assistants like Siri & Alexa are a new enterprise attack vector. Our analysis covers the "Dolphin Attack," malicious skills, and a CISO playbook for this emerging threat.
Ev
Sep 19, 2025
Cybersecurity Strategy
Data Security: AI Personas

Data Security: AI Personas

What if the person you're talking to isn't real? Discover how AI personas create new insider threats and why Data Security with DLP and XDR is your best defence.
Ev
Jul 19, 2025
Cybersecurity Strategy
Zero‑Trust Security Architecture

Zero‑Trust Security Architecture

Learn how zero‑trust security architecture, micro‑segmentation and identity‑centric security stop lateral movement, meet DORA/NIS2, and cut breach costs by 40 %.
Ev
Jul 15, 2025
Cybersecurity Strategy
Made with inblog

Trescudo Blog

RSS·Powered by Inblog