December 3, 2020 | Chuck Brooks

Two cybersecurity hygiene actions to improve your digital life in 2021

This blog was written by an independent guest blogger. It is that time of year again where we start planning resolutions for the coming year. A good start is putting cybersecurity on the top of the list whether you are a business or individual. According to a University of Maryland study, Hackers attack every 39 seconds, on average 2,244 times a day.…

December 2, 2020 | David Bisson

How to secure a Kubernetes cluster

This blog was written by an independent guest blogger. More and more organizations are adopting Kubernetes, but they’re encountering security challenges along the way. In the fall 2020 edition of its “State of Container and Kubernetes Security” report, for instance, StackRox found that nearly 91% of surveyed organizations had adopted Kubernetes, with a majority (75%) of participants revealing that…

Get the latest
security news
in your inbox.

Subscribe via email


December 1, 2020 | Theodoros Karasavvas

What is Vizom malware? Everything you need to know

This blog was written by an independent guest blogger. Security researchers working with IBM Security recently uncovered a new malware code that is being used to attack online banking users in Brazil.  Referred to as ‘Vizom’ by the team, the code utilizes remote overlay attacks to siphon sensitive financial data and make fraudulent transactions from victims bank…

November 30, 2020 | Rupesh Chokshi

​​​​​​​The perfect storm: How digital transformation is reshaping security and networking

Think back to the end of 2019. Enterprises were evolving IT infrastructure at a moderate pace to reduce costs, be more competitive, and improve their ability to adapt to an increasingly digitized world. Whether migrating workloads to the cloud, virtualizing network functions, diversifying mobility, or moving applications and services closer to the edge, digital transformation was steadily evolving the business landscape. …

November 24, 2020 | Mark Stone

What is Third-Party Risk Management?

Creating and maintaining relationships with third parties brings about multiple risks. Whether your organization is large or small, it’s almost certain that you have business relationships with many third parties for specific types of operations. When operational data and confidential information are exchanged with third parties, that data and information are vulnerable to misuse and exploitation. This is…

November 18, 2020 | Tony DeGonia

5 questions every higher-ed security leader should ask

Patrick Robinson and Mike McLaughlin contributed to this blog. In the day and age of COVID-19 we have witnessed a transformation of the way we work. If I were asked before March of 2020 how long it would take to make the progress in digital and security transformation that we as a society have made in the last 9 months, I would…

November 17, 2020 | Nick Cavalancia

Phishing awareness and phishing training explained

There is no more effective initial attack vector than phishing. With an ability to reach well-within your organization’s logical perimeter all the way down to an individual user’s Inbox with some form of malicious content, phishing has proven to be a challenge to organizations working to maintain a proper security stance.  On top of this,…

November 17, 2020 | Jason Lawrence

Raising email security awareness through gamification

October was National Cyber Security Awareness Month which is an excellent opportunity to invest in a modern approach to email security awareness.  Most companies and organizations conduct security awareness training annually, during onboarding, and after an adverse event.  The effectiveness of periodic training varies greatly and depends on organizational culture and structure, leading to unexpected or undesired results.…

November 17, 2020 | Mark Stone

What is unified endpoint management? UEM explained

This blog was written by a third party author. The business world is undergoing its most dramatic shift yet with the adoption of digital assets and workforce decentralization representing a huge business opportunity. These changes have led to added endpoints, or devices connecting to the network, and is enabling this transformation. But managing the volumes of these diverse endpoints and…

November 16, 2020 | Joe English

Stories from the SOC – Multi-layered defense detects Windows Trojan

Stories from the SOC is a blog series that describes recent real-world security incident Investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive summary Malware infections are common and are often missed by antivirus software. Their impact to critical infrastructure and applications can be devastating to…

November 12, 2020 | Karoline Gore

Online purchase scams spike since the start of COVID-19, reports BBB

This blog was written by an independent guest blogger. Scams occurring during online purchases have spiked since the start of the pandemic, as reported in new research conducted by the Better Business Bureau (BBB). Around 80.5% of consumers who reported this type of scam this year lost money, compared to 71.2% in 2015. Online purchasers scams have been among the…

November 11, 2020 | Scott Petry

The Netflix streaming model can obviate your employee’s computer security

This blog was written by an independent guest blogger. Someone you don’t know walks into your office and sits down at a computer. Maybe that computer is a corporate desktop assigned to a mid-level manager or to a member of your IT department. Maybe it’s a personally owned laptop used by a contractor. That unknown person…