Structured Data | ["{\"@context\":\"https://schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https://www.truesec.com/\",\"url\":\"https://www.truesec.com/\",\"name\":\"Truesec - Experts in Cybersecurity\",\"isPartOf\":{\"@id\":\"https://www.truesec.com/#website\"},\"about\":{\"@id\":\"https://www.truesec.com/#organization\"},\"primaryImageOfPage\":{\"@id\":\"https://www.truesec.com/#primaryimage\"},\"image\":{\"@id\":\"https://www.truesec.com/#primaryimage\"},\"thumbnailUrl\":\"https://www.truesec.com/wp-content/uploads/2024/02/truesec-center-darkbg.jpg\",\"datePublished\":\"2023-10-30T08:10:13+00:00\",\"dateModified\":\"2025-04-01T09:02:05+00:00\",\"description\":\"Cybersecurity services, managed services, and incident response. We prevent breaches and minimize their impact with our specialized expertise\",\"breadcrumb\":{\"@id\":\"https://www.truesec.com/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https://www.truesec.com/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https://www.truesec.com/#primaryimage\",\"url\":\"https://www.truesec.com/wp-content/uploads/2024/02/truesec-center-darkbg.jpg\",\"contentUrl\":\"https://www.truesec.com/wp-content/uploads/2024/02/truesec-center-darkbg.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"truesec logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https://www.truesec.com/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https://www.truesec.com/#website\",\"url\":\"https://www.truesec.com/\",\"name\":\"Truesec\",\"description\":\"Experts in cybersecurity\",\"publisher\":{\"@id\":\"https://www.truesec.com/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https://www.truesec.com/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https://www.truesec.com/#organization\",\"name\":\"Truesec AB\",\"url\":\"https://www.truesec.com/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https://www.truesec.com/#/schema/logo/image/\",\"url\":\"https://www.truesec.com/wp-content/uploads/2023/09/site-logo.svg\",\"contentUrl\":\"https://www.truesec.com/wp-content/uploads/2023/09/site-logo.svg\",\"width\":171,\"height\":26,\"caption\":\"Truesec AB\"},\"image\":{\"@id\":\"https://www.truesec.com/#/schema/logo/image/\"},\"sameAs\":[\"https://www.facebook.com/Truesec/\",\"https://x.com/Truesec\",\"https://www.linkedin.com/company/truesec/\",\"https://www.youtube.com/channel/UCIAtgUfBYGSWoUvgG3293Ug\"]}]}"] |
External Link(s) | ["https://www.truesec.com/", "https://www.truesec.com/cybersecurity-platform", "https://www.truesec.com/service", "https://www.truesec.com/service", "https://www.truesec.com/digital-forensics-and-incident-response-dfir", "https://www.truesec.com/service/incident-response", "https://www.truesec.com/service/incident-response-retain", "https://www.truesec.com/service/managed-detection-and-response", "https://www.truesec.com/service/mdr-core", "https://www.truesec.com/service/mdr-enterprise", "https://www.truesec.com/service/mdr-black", "https://www.truesec.com/service/security-incident-preparedness", "https://www.truesec.com/advisory-and-workshops", "https://www.truesec.com/service/incident-response-exercises", "https://www.truesec.com/service/threat-intelligence", "https://www.truesec.com/service/predicting-cyber-atta", "https://www.truesec.com/service/early-warning-sensor", "https://www.truesec.com/service/penetration-testing", "https://www.truesec.com/service/red-team-testing", "https://www.truesec.com/service/grc", "https://www.truesec.com/service/active-directory-tiering-implementation", "https://www.truesec.com/service/cloud-security-posture-management-cspm", "https://www.truesec.com/service/nist-implementation", "https://www.truesec.com/service/cyber-resilience-strategy", "https://www.truesec.com/service/human-threat", "https://www.truesec.com/service/vulnerability-scanning", "https://www.truesec.com/service/improvements-mitigations", "https://www.truesec.com/service/vulnerability-detection", "https://www.truesec.com/service/iam-identity-management", "https://www.truesec.com/service/iam-deployment", "https://www.truesec.com/service/application-security", "https://www.truesec.com/service/application-security-assessment-asa", "https://www.truesec.com/service/cloud-security", "https://www.truesec.com/service/intune-security-baseline", "https://www.truesec.com/service/cloud-native-endpoints", "https://www.truesec.com/service/microsoft-cloud-security-review", "https://www.truesec.com/service/m365-security-governance", "https://www.truesec.com/service/conditional-access-baseline-implementation", "https://www.truesec.com/solutions", "https://www.truesec.com/solutions", "https://www.truesec.com/solutions/ot-security", "https://www.truesec.com/solutions/csam", "https://www.truesec.com/solutions/vmware-security", "https://www.truesec.com/solutions/cyber-due-diligence", "https://www.truesec.com/solutions/stop-cyber-attacks-24-7", "https://www.truesec.com/solutions/reduce-your-attack-surface", "https://www.truesec.com/solutions/third-party-risk-management", "https://www.truesec.com/hub/blog", "https://www.truesec.com/webinars-and-events", "https://www.truesec.com/cases", "https://www.truesec.com/hub/guide", "https://www.truesec.com/hub/report", "https://www.truesec.com/who-we-are", "https://www.truesec.com/experts", "https://www.truesec.com/news", "https://www.truesec.com/career", "https://www.truesec.com/partner", "https://www.truesec.com/cybersecurity-center", "https://www.truesec.com/contact", "https://www.truesec.com/incident", "https://soc.truesec.app", "https://de.truesec.com/", "https://www.truesec.fi/", "https://www.truesec.se/", "https://www.truesec.com/contact", "https://www.truesec.com/incident", "https://www.truesec.com/news/truesec-and-ey-teams-strategically-partner-to", "https://www.truesec.com/news/truesec-and-ey-teams-strategically-partner-to", "https://www.truesec.com/news/navigating-uncertainty-in-a-volatile-geopolit", "https://www.truesec.com/news/navigating-uncertainty-in-a-volatile-geopolit", "https://www.truesec.com/news/truesec-partners-with-nozomi-networks-to-secu", "https://www.truesec.com/news/truesec-partners-with-nozomi-networks-to-secu", "https://www.truesec.com/news/truesec-releases-2025-threat-intelligence-rep", "https://www.truesec.com/news/truesec-releases-2025-threat-intelligence-rep", "https://www.truesec.com/news/truesec-acquires-foresights-a-specialist-in-cyber-security-advisory-and-intelligence", "https://www.truesec.com/news/truesec-acquires-foresights-a-specialist-in-cyber-security-advisory-and-intelligence", "https://www.truesec.com/news/truesec-and-netclean-announce-strategic-partnership", "https://www.truesec.com/news/truesec-and-netclean-announce-strategic-partnership", "https://www.truesec.com/news/truesec-and-netclean-announce-strategic-partn", "https://www.truesec.com/news/truesec-and-netclean-announce-strategic-partn", "https://www.truesec.com/news/truesec-lanserar-mdr-black-en-ny-cybersakerhe", "https://www.truesec.com/news/truesec-lanserar-mdr-black-en-ny-cybersakerhe", "https://www.truesec.com/news/fredrik-nylander-new-chairman-of-the-board-of", "https://www.truesec.com/news/fredrik-nylander-new-chairman-of-the-board-of", "https://www.truesec.com/news/fredrik-nylander-new-chairman-of-truesec", "https://www.truesec.com/news/fredrik-nylander-new-chairman-of-truesec", "https://www.truesec.com/news", "https://www.truesec.com/hub/blog/critical-cve-2025-32433-erlang-otp-ssh-remote-code-execution-vulnerability", "https://www.truesec.com/hub/blog/critical-cve-2025-32433-erlang-otp-ssh-remote-code-execution-vulnerability", "https://www.truesec.com/hub/blog/threat-intelligence-report-q1-2025-quarterly-summary", "https://www.truesec.com/hub/blog/threat-intelligence-report-q1-2025-quarterly-summary", "https://www.truesec.com/hub/blog/critical-authentication-bypass-vulnerabilities-cve-2025-2825-cve-2025-31161-in-crushftp", "https://www.truesec.com/hub/blog/critical-authentication-bypass-vulnerabilities-cve-2025-2825-cve-2025-31161-in-crushftp", "https://www.truesec.com/hub/blog/cve-2025-22457-ivanti-buffer-overflow-vulnerability", "https://www.truesec.com/hub/blog/cve-2025-22457-ivanti-buffer-overflow-vulnerability", "https://www.truesec.com/cybersecurity-summit", "https://www.truesec.com/threat-intelligence-report-2025", "https://www.truesec.com/webinars-and-events", "https://www.truesec.com/security", "https://www.truesec.com/", "https://www.truesec.com/who-we-are", "https://www.truesec.com/experts", "https://www.truesec.com/news", "https://www.truesec.com/business-policy", "https://www.truesec.com/career", "https://career.truesec.com/jobs", "https://career.truesec.com/departments", "https://www.truesec.com/threat-intelligence-report-2025", "https://insights.truesec.com/newsletter-signup", "https://www.truesec.com/hub/report", "https://www.truesec.com/hub/guide", "tel:+468100010", "https://www.facebook.com/Truesec/", "https://twitter.com/Truesec", "https://www.linkedin.com/company/truesec/", "https://www.youtube.com/channel/UCIAtgUfBYGSWoUvgG3293Ug", "https://www.truesec.com/privacy-and-terms", "https://www.truesec.com/cancellation-policy-truesec-events", "https://www.truesec.com/reporting-misconduct", "https://www.truesec.com/sitemap_index.xml"] |