Stay ahead in cyber
Knowledge Hub

Article
Your 5-step list
5 Hygiene Hacks for IT: Reduce the Risk of Ransomware
Don't listen to the vendors; you don't need to invest in a lot of new products to be safe from ransomware. Here is your 5-step list of actions that will drastically improve your cyber resilience – by mostly using functionality you already have.
Read more
Blog
Threat Intelligence update
How To Prepare for an Escalating Cyber Conflict
While current cyber attacks are primarily targeting Ukraine and Russia, there is an increased risk of cyber attacks targeting companies and organizations in Europe and in the U.S. Read this blog post with 10 important recommendations to protect your organization from current threats.
Read more
Report
Actionable insights and advice
Threat Intelligence Report 2022
We see a shift in tactics, revealed in our new report: Cybercriminals are becoming more and more efficient at exploiting vulnerabilities to gain access to environments. Download the report to gain actionable insights into the evolving cyber threat landscape, and advice on prioritizing your cybersecurity efforts in 2022.
Download report
Blog
Threat intelligence in practice
Understanding the Value and Use of Threat Profiles
The "Truesec Threat Intelligence Report" is aimed at many consumers. In this blog post we delve into "the next step,” or more specifically, your organization’s threat profile.
Read more
Blog
Harden your infrastructure
Secure Your VMware ESXi Hosts Against Ransomware
The increase in ransomware targeting VMware vSphere ESXi hosts and encrypting all virtual machines calls for countermeasures. You can secure your ESXi hosts from ransomware execution by following three simple steps.
Read how