Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Social Media Cybersecurity: Don't Let Employees Be Your Weakest Link

Maintaining an active social media presence can be a great way to improve brand visibility and generate leads, but it also opens the door to cybersecurity risks — from phishing scams and malware to identify theft and data breaches. If employees accidentally post confidential information or click dodgy links via corporate accounts, cybercriminals can launch malicious attacks that can cause lasting damage to your business (67% of data breaches result from human error).

Cybersecurity Hygiene Checklist for 2024

To maintain good cybersecurity hygiene, individuals and organizations should follow a cybersecurity hygiene checklist that outlines best practices to keep themselves protected, such as regularly backing up data, keeping software up to date and using strong passwords. Continue reading to learn more about how you or your organization can strengthen your cybersecurity hygiene in 2024.

Highlights from BSides Buffalo 2024

Sedara attended Buffalo’s very own BSides conference in early June. BSides are cybersecurity conferences held across the world, often planned and hosted by grassroots organizers. They’re a great way to learn about the latest trends in the industry and network with both established and aspiring professionals. Several of our team members attended this year’s conference, and here are their takeaways.

Is AI-generated code secure? Maybe. Maybe not.

Generative AI has emerged as the next big thing that will transform the way we build software. Its impact will be as significant as open source, mobile devices, cloud computing—indeed, the internet itself. We’re seeing Generative AI’s impacts already, and according to the recent Gartner Hype Cycle for Artificial Intelligence, AI may ultimately be able to automate as much as 30% of the work done by developers.

Heightened Exploit Attempts on Check Point's Recent VPN Zero-Day Vulnerability

A significant surge in exploitation attempts targeting a newly disclosed information disclosure flaw in Check Point's VPN technology has been observed recently. This has underscored the urgent need for organizations to address the vulnerability immediately.

We need to talk about cybersecurity spending

Security budgets naturally compete with other priorities for funding, and finance departments traditionally prioritize immediate financial gains over long-term investments. Cybersecurity, with its focus on prevention, is often seen as an element that’s ‘nice to have’ rather than a necessity. Especially when compared to tangible projects with quicker returns, cybersecurity initiatives can be left chronically underfunded. Where do we spend? And where are the attacks coming from?

Celebrating 10 years of Project Galileo

One of the great benefits of the Internet has been its ability to empower activists and journalists in repressive societies to organize, communicate, and simply find each other. Ten years ago today, Cloudflare launched Project Galileo, a program which today provides security services, at no cost, to more than 2,600 independent journalists and nonprofit organizations around the world supporting human rights, democracy, and local communities.

Cyber Alert, Ep. 1 | Seattle Kraken | WatchGuard Technologies

If you're protecting the net for an NHL franchise or being the last stop for your IT team, vigilance is key. Join Philipp Grubauer, goaltender for the Seattle Kraken, as he teams up with the Kraken IT team to block cyber threats and keep systems secure. Just like on the ice, when duty calls, you've got to respond fast!