Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

FTC's New Deadline for the Gramm-Leach-Bliley Safeguards Rule

The Gramm-Leach-Bliley Act (GLBA) applies to many types of financial institutions, like banks, savings and loans, credit unions, insurance companies and securities firms. It requires those organizations to explain their information-sharing practices to their customers and to protect sensitive data. On November 15, 2022, The FTC announced a six-month extension for companies to comply with data security provisions in the GLBA. The new deadline is June 9, 2023.

What is MDR?

MDR (Managed Detection and Response) is a type of cybersecurity service that combines advanced threat detection technologies with human expertise to provide continuous monitoring and rapid response to cyber threats. These services involve a team of cybersecurity experts who monitor an organization’s network and endpoints in real-time using advanced security tools, such as threat intelligence, machine learning, and behavioral analytics.

Sedara Named to MSSP Alert's Top 250 MSSPs List for 2022

The list and research identify and honor the top MSSPs (managed security service providers) worldwide. The rankings are based on MSSP Alert’s 2022 readership survey combined with the site’s editorial coverage of MSSP, MDR and MSP security providers. The sixth-annual list and research track the MSSP market’s ongoing growth and evolution.

The Top 5 Security Breaches of 2021

Has your business experienced one of the Top 5 Security Breaches of 2021? Sadly, many have. As businesses become more reliant on technology, the risk of becoming a victim of a data breach only increases. Unfortunately, the United States exceeded the previous record of cyber attacks in a single year. In 2017, we saw a whopping 1,529 data breaches – compared to the 1,862 data breaches we saw last year.

The Federal Trade Commission Announces New Updates

The Federal Trade Commission (FTC) put significant updates into effect on January 10th, 2022, to strengthen the Standards for Safeguarding Customer Information (Safeguards Rule) under the Gramm-Leach-Bliley Act (GLBA) to protect consumer data collected by financial institutions. The amendment applies to nonbank financial institutions and requires them to develop, implement, and maintain a comprehensive cybersecurity program in order to protect their customers’ information.

Is a SIEM Right For You?

Security Information and Event Management (SIEM) is the combination of Security Information Management (SIM) and Security Event Management (SEM) systems. SEM systems store and interpret logs for real-time security event analysis which enables quick defensive action. SIM systems collect data for trend analysis and provide automated reporting. By combining these two technologies together, a SIEM provides rapid identification, analysis, and recovery from security events.

Exchange Servers Getting Hit through ProxyShell Vulnerabilities

ProxyShell is a massive new exploit campaign that is targeting vulnerable Microsoft Exchange servers. The servers are publicly available and the campaign is directly responsible for a number of breaches and subsequent ransomware attacks. There have been thousands of compromised Exchange servers to date. Ransomware is simply the byproduct of unauthorized access and privilege escalation and typically has to start with something like ProxyShell providing an attacker remote access.

Differences Between Penetration Testing and Vulnerability Scanning

Often, penetration testing (or pen testing) and vulnerability scanning are used interchangeably. In doing so, the importance of each method of testing gets lost in the confusion. Both of these are significant in protecting your data and infrastructure for different reasons. In the age of digitally storing information and companies having an online network presence, it’s easy for hackers to find their way in. This is why both pen testing and vulnerability scanning are important.

Apple's Vulnerability

Apple has issued an emergency software update after a cyber-surveillance company created invasive spyware that could infect any iPhone, iPad, Apple Watch, or Mac Computer. Toronto-based internet watchdog security group Citizen Lab said that NSO, the surveillance company which is an Israeli spyware company, developed the tool with a technique that could easily exploit Apple software.