Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Highlights from BSides Buffalo 2024

Sedara attended Buffalo’s very own BSides conference in early June. BSides are cybersecurity conferences held across the world, often planned and hosted by grassroots organizers. They’re a great way to learn about the latest trends in the industry and network with both established and aspiring professionals. Several of our team members attended this year’s conference, and here are their takeaways.

The Howler Episode 9: Andy Hill, Chief Legal Officer & General Counsel

This month we sit down with Andy Hill, Chief Legal Officer & General Counsel, as he shares why he's always been drawn to corporate law versus litigation, how he navigates providing counsel during difficult situations, taking companies through IPO, and so much more!

What Really Grinds My Gears In Infosec!

Welcome to Razorwire! Join me, Jim, and my guests Chris Dawson and Iain Pye, as we dive into the daily frustrations and pressing issues facing cybersecurity professionals. This episode is filled with insights, gripes, and laughable clichés that saturate our industry. From award ceremony hype to exaggerated LinkedIn credentials, we tackle it all. Stay tuned and subscribe for a candid look at the ups and downs of working in infosec.

Building a Robust Vendor Risk Management Dashboard

In today’s interconnected business landscape, outsourcing to third-party vendors and service providers is an effective method for most organizations to improve operational efficiency and lower financial costs. However, as businesses form third-party partnerships, they inherit potential risks and increase the complexity of their third-party ecosystem, as any one vendor can become an attack vector that cybercriminals exploit to pursue a data breach.

Social Media Cybersecurity: Don't Let Employees Be Your Weakest Link

Maintaining an active social media presence can be a great way to improve brand visibility and generate leads, but it also opens the door to cybersecurity risks — from phishing scams and malware to identify theft and data breaches. If employees accidentally post confidential information or click dodgy links via corporate accounts, cybercriminals can launch malicious attacks that can cause lasting damage to your business (67% of data breaches result from human error).

Ultimate Protection: CyberArk Secure Browser & Proofpoint Anti-Phishing Integration | CyberArk

Discover the next level of web security with the CyberArk Secure Browser! In this video, we dive into the powerful features of CyberArk's Secure Browser, designed to provide: Granular Policy Controls Data Exfiltration Prevention Session Monitoring Credential Security Privacy Enforcement But that's not all! We also explore how combining CyberArk's Secure Browser with Proofpoint's industry-leading anti-phishing capabilities offers users comprehensive, real-time protection against phishing sites attempting to steal credentials and sensitive data.

Adding Windows Devices | JumpCloud University Tutorial (2024)

In this tutorial, we'll cover how to add your company's Windows devices to your JumpCloud directory leveraging the JumpCloud agent. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.