Truesec
Platform
Services
Services
We offer cyber breach management services across all affected areas. Connect with a cybersecurity consultant for further details.
Services
Digital Forensics and Incident Response
Incident Response
Priority (IR) Retainer
Managed Detection and Response
MDR Core
MDR Enterprise
MDR Black
Incident Preparedness
Advisory and Workshops
Incident Response Exercise
Threat Intelligence
Attack Prediction
Early Warning Sensor
Penetration Test
Red Team
Governance, Risk, and Compliance
Cloud Security
Cloud Security Posture Management
Compliance (ISO27001, NIS2, NIST, DORA)
Cyber Resilience Program
Human Threat Intelligence
Human Threat Intelligence Trainings
Position Exposure Analysis
Security Vetting Operations
Travel & Event Security Support (TESS)
Vulnerability and Posture Management
Security Improvements and Mitigations
Vulnerability Management
Identity and Access Management (IAM)
IAM Deployment
Application Security
Application Security Assessment
Resources
Resources
Cybersecurity is becoming increasingly important in today’s world. Truesec providing explanations of a variety of cybersecurity topics.
Explore cyber topics
Insights
Discover the latest cybersecurity insights.
Events and Webinars
Cybersecurity webinars and events for tech professionals and business leaders
Trainings
Expand your knowledge with hands-on sessions in cybersecurity.
Cases
Explore our intriguing cybersecurity cases and solutions.
Guides
Check out our guides for valuable insights and effective strategies.
Reports
Get insights into the latest trends and observations in the security landscape.
Company
Company
We stay ahead of cybercriminals and find the best possible solution for you. We prevent breach and minimize impact.
Contact us
Who We Are
One partner for all cybersecurity solutions.
Our Experts
Industry-leading professionals with extensive experience and a passion for defending against cyber threats.
Newsroom
Stay current with the latest Truesec news.
Career
Join a highly skilled team of cybersecurity professionals.
Cybersecurity Center
A collaborative hub for innovation, sharing knowledge, and protecting society against digital threats.
Talk to us!
Under Attack
Login
English
Deutsch
Suomi
Svenska
Cybersecurity webinars
Professional services
On-demand webinars
Webinar
How To Securely Manage Your Environment Remotely
Mikael Nyström
Webinar
How to Protect Your ESXi and vCenter from Getting Ransomware
Anders Olsson
Webinar
How IAM can mitigate identity theft
Daniel Jaurén
Kuno Kasper Larsen
Webinar
Learnings from 40.000 hours of pentesting – external exposures
Fabio Viggiani
Webinar
Get ready for new regulations in cyber
Mats Hultgren
Levi Bergstedt
Webinar
Learnings from 40.000 hours of pentesting – internal exposures
Fabio Viggiani
Webinar
Common Active Directory Misconfiguration
Peter Löfgren
Webinar
Azure Arc – Modern Server Management
Mikael Nyström
Webinar
How To Improve Your Microsoft Cloud Security Posture
Daniel Chronlund
Marcus Pettersson
Latest posts
Cybersecurity
From Data to Intelligence: Demystifying Dark Web Monitoring Services
Cybersecurity
UPDATED: Critical Fortinet Remote Code Execution ZeroDay Vulnerability
Cybersecurity
Critical Unauthenticated RCE Flaws in CUPS Printing Systems
Cybersecurity
Attacking PowerShell CLIXML Deserialization