Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Business Continuity, Disaster Recovery, and Security Incident Response Plan - Sedara Whiteboard

Incident response is a structured process organizations use to identify and deal with cybersecurity incidents. Response includes several stages, including preparation for incidents, detection and analysis of a security incident, containment, eradication, and full recovery, and post-incident analysis and learning. What are some tips for making effective plans? Watch this episode of Sedara's Whiteboard Series to find out.

Identifying a Quality Pentest - Sedara Whiteboard Series

In this episode of the Sedara Cybersecurity Whiteboard Series, our Lead Pentester Nick Aures talks about what to look for in a quality pentest. Nick breaks the talk down into 4 key takeaways: Take a look, and we hope it’s helpful. What Should I Look for in a Quality Penetration Test? Penetration testing is a fundamental part of validating the security measures you’ve taken and showing they are effective.

Methods of Social Engineering

What are some of the methods phishers use to compromise organizations? In this video, Nick goes over the common methods phishers use to gain information: Phishing is most insidious when it uses a combination of techniques. It can even overcome sophisticated security measures like Multifactor Authentication (MFA) – for example, if an attacker manages to steal a password through email, then calls the user pretending to be a technician asking them to approve an authenticator popup on their phone.

Goals of Social Engineering

Social engineering, including phishing, is one of the best opportunities for an attacker to enter a well-secured network. Knowing what data is at risk is an important part of any security strategy. What data or systems of value does your organization have access to? That’s what an attacker will try to hijack. Sedara can help protect your organization against social engineering attacks and more. Subscribe to our YouTube Channel to learn more about protecting your organization.

What is Social Engineering?

Many organizations focus on technological controls to protect their assets. But that’s only part of the story! Smart attackers use social engineering to achieve their goals in compromising networks and data. In a social engineering attack vector, attackers lie or present deceptive fronts to convince people to divulge information or take some action that allows the attackers access. If you learned anything from this video, please subscribe to our YouTube Channel! We will be releasing more videos to help you understand cybersecurity for your organization.

What is a Gap Assessment?

The NIST Cybersecurity Framework (CSF) provides a list of best practices organizations can follow to maintain a secure environment. At first glance, the list can seem quite complex! When Sedara works with a client to improve their security posture, we do in-depth information gathering. The questions asked might include things like: How do you keep your computer systems updated? How often are they updated? How do you manage adding access for new hires, and ending access for terminations? Do you provide your staff training so they are up-to-date on security threats?

What is the NIST CSF? - Sedara Whiteboard Series

Welcome back to the Sedara Whiteboard series. In this episode, we will discuss frequently asked questions about NIST CSF. The NIST Cybersecurity Framework, developed by the National Institute of Standards and Technology, integrates industry standards and bast practices to help organizations manage their cybersecurity risks. It is widely used across schools, government organizations, and businesses across the globe. Sedara uses the NIST CSF as a basis for testing the posture of an organization’s security.