Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Intelligence for Small Organizations

Many smaller organizations aren’t sure where to start with threat intelligence; it may seem like the kind of maturity reserved for large organizations. Threat intelligence is a proactive cybersecurity strategy focused on collecting information about current threats, analyzing it, and using that information to identify and mitigate threats within the network. It’s approachable even for smaller organizations that don’t have the resources for novel research and analysis.

Highlights from BSides Buffalo 2024

Sedara attended Buffalo’s very own BSides conference in early June. BSides are cybersecurity conferences held across the world, often planned and hosted by grassroots organizers. They’re a great way to learn about the latest trends in the industry and network with both established and aspiring professionals. Several of our team members attended this year’s conference, and here are their takeaways.

Cybersecurity and Doughnuts: A Sweet Approach to Office Security

In the realm of office dynamics and cybersecurity, sometimes the simplest strategies are the most effective. One such strategy that has gained popularity here amongst our ranks is the penalty of buying doughnuts for the office whenever someone forgets to lock their computer when stepping away. This sweet approach not only keeps cybersecurity at the forefront of everyone’s mind but also fosters a sense of camaraderie and accountability.

Hardening Systems through Security Benchmarks

System hardening is the process of configuring a system to a more secure state. Many technology solutions are not securely configured by default, so system administrators must harden systems while retaining their desired functionality. Thankfully, system administrators do not have to figure out system hardening on their own. Instead, they can reference security benchmarks which describe recommended secure configurations for a system.

Succeeding at Cloud Vulnerability Management

Many organizations are migrating to cloud infrastructures. The cloud presents new levels of flexibility and scalability in the way organizations operate. But as with any new opportunity, it also creates new forms of risk. How can organizations succeed at identifying and remediating these security risks?

NIST CSF 2.0 is Here. What do You Need to Know?

NIST released the much-anticipated update to its popular Cybersecurity Framework (CSF) in February 2024. The NIST CSF is one of the most widely used cybersecurity frameworks, designed to help organizations of any size in any industry holistically start, mature, and sustain a cybersecurity program. The latest version of the NIST CSF—NIST CSF 2.0—brings several enhancements over the previous version. This article will cover what you need to know about the new NIST CSF 2.0.

How to Build a Cybersecurity Awareness and Training Program

Cybersecurity professionals possess many tools to reduce risk. However, it is no accident in a field so concerned with technology that technological tools are often prioritized over others: as the Law of Instrument says, “if the only tool you have is a hammer, it is tempting to treat everything as if it were a nail.” Therefore, cybersecurity professionals should not neglect the other tools, such as awareness and training.

So, You Want to be Compliant. Now What?

Cybersecurity compliance frameworks serve two functions: (1) they voluntarily provide a roadmap for organizations to follow to create robust, sustainable cybersecurity programs and (2) they mandatorily serve as legal or regulatory obligations to which organizations must demonstrate adherence. The ultimate intent of cybersecurity frameworks, regardless of their underlying function, is to reduce cybersecurity risk.

Highlights from The Rochester Security Summit 2023

October’s a fun month in the cybersecurity field, and not just because of the costumes and candy. Since it was designated as the National Cybersecurity Awareness Month in 2004, October’s always packed with great events, such as the Rochester Security Summit (RSS). RSS has been a leading regional cybersecurity conference in Upstate New York since 2006, where hundreds of attendees gather to share about the latest advancements in the field.