Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Zero Trust Summit Fireside Chat with Jim Dolce

Jim Dolce was featured on a moderated main stage discussion, alongside Francis Rose, at the Zero Trust Summit in Washington, D.C. This engaging conversation examined how to secure the edge to meet OMB Zero Trust requirements. The event gathered top government IT decision makers and influencers in-person and virtual via livestream for a day of engaging conversations on the adoption of Zero Trust.

CrowdStrike Falcon Intelligence Recon

CrowdStrike Falcon Intelligence Recon enables organizations to better protect their brand, employees, and sensitive data by allowing security teams to easily conduct investigations of underground activity. By empowering security teams to conduct investigations in real time, they can proactively uncover fraud, data breaches, phishing campaigns and protect their brand from other online threats that target their organization.

Measuring Cyber Hygiene

What you can’t measure, you can’t improve. In cybersecurity, nothing like this existed until SecurityScorecard came along. We introduced a set of objective KPIs that are trustworthy, accurate, and could be used to compare companies to each other. We do this by assembling hundreds of different signals across different categories of risk, such as application security, network security, endpoint security, leaked credentials, and shared records.

What is the NIST CSF? - Sedara Whiteboard Series

Welcome back to the Sedara Whiteboard series. In this episode, we will discuss frequently asked questions about NIST CSF. The NIST Cybersecurity Framework, developed by the National Institute of Standards and Technology, integrates industry standards and bast practices to help organizations manage their cybersecurity risks. It is widely used across schools, government organizations, and businesses across the globe. Sedara uses the NIST CSF as a basis for testing the posture of an organization’s security.