Skip to content
TRAC-Logo
 

Frustration-Free Risk Management

Simplify cybersecurity risk management and tackle your cybersecurity challenges with ease. TRAC automates the tedious risk assessment process and produces customized results that align with regulations, best practices, and your strategic goals.

Blog_HeaderGradients-10

Blog

The FFIEC CAT Tool's 9th Life: What Financial Institutions Need to Know About Its Sunset

The FFIEC CAT Tool will sunset in 2025, prompting financial institutions to transition to alternative cybersecurity frameworks. Find out more about the implications and next steps.
Start Reading

Ransomware Evolution and the Updated CISA Guide: Strengthening Cybersecurity in the Era of Advanced Threats?

Learn the key updates made to the CISA Ransomware Guide, including details on preventing common initial infection vectors, cloud backups and zero trust architecture, threat-hunting tips, and more.
Start Reading

SBS Institute Webinar: Data Demystified - A Guide to Effective Classification and Retention

In this webinar, we’ll explore the best practices and guidance around data classification and document retention, including how to properly store electronic records, for how long, and where to keep your records.
Start Reading

National Public Data Breach: A Comprehensive Overview

After a significant data breach such as the recent NPD incident, your personal information may have been compromised. How do you move forward?
Start Reading

Hacker Hour: Unveiling the Most Common Findings in Penetration Testing

Join us to uncover the most common findings in penetration testing and offer proactive solutions to fortify your network before your next penetration test.
Start Reading

SBS Institute Webinar: A Hacker's Guide to Password Cracking

In this webinar, we'll explore the art of password compromise and cracking, including how to create strong passwords, how fast passwords can be cracked today, and how to prevent password reuse.
Start Reading

Cyber Showcase: All About InTREx (Featuring a Brand-New TRAC Module!)

Join us as we discuss InTREx, how it differs from other frameworks, how it's used, and more. We will also roll out a brand-new InTREx module of our TRAC tool.
Start Reading

Lessons Learned from the Change Healthcare Ransomware Attack

Explore the advancements of NIST CSF 2.0 in our comprehensive guide, detailing new cybersecurity enhancements, risk management strategies, and organizational benefits.
Start Reading

Security Advisory: CrowdStrike Outage Due to Faulty Update to Windows Devices

A routine software update from CrowdStrike caused a massive, global technology outage for nearly anyone leveraging a combination of a Windows Operating System environment and Crowdstrike’s Falcon product.
Start Reading

Hacker Hour: Harnessing the Value of Data Flow Diagrams

Join us as we outline the essential inputs and outputs of a good data flow diagram and discuss common challenges faced when creating and interpreting them.
Start Reading