February 13, 2020 | Bob Covello

InfoSec needs a reputation overhaul

An independent guest blogger wrote this blog. I was in a medical office the other day, and when the doctor came into the room, he needed to unlock his phone to contact a pharmacy.  I couldn’t help but notice that his home screen had a photo of an infant.  It was an adorable infant, and I…

Real attacks and fake factories, Honeypots expose risks to smart manufacturing systems. | ThreatTraq

Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers. I really enjoy them; you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent feature on ThreatTraq. The video features Mike Klepper, Principal Architect, AT&T…

Get the latest security news in your inbox.

Subscribe via Email

February 11, 2020 | Karoline Gore

New PayPal phishing scam seeks to go beyond login credential information

Photo by Kon Karampelas on Unsplash An independent guest blogger wrote this blog. Up until now, some of PayPal users’ greatest fears in terms of cybersecurity were phishing scams aimed at obtaining their login credentials. In January of this year, PayPal confirmed a high-severity bug affecting the login form, with PayPal security investigator, Alex…

February 6, 2020 | Devin Morrissey

Building comprehensive cybersecurity policies

Image Source: Photo by freestocks.org on Unsplash An independent guest blogger wrote this blog. When you think of cybersecurity, what’s the first thing to come to mind? Most of the time, it might be your business’s IT team, who run around worrying about updates, threats, and computing capacity. The reality is that cybersecurity isn&rsquo…

February 5, 2020 | Kevin Landt

10 things to know about cybersecurity in 2020

Cybersecurity talent is elusive, resources are dwindling, but hacks are on the rise. We’re addressing these challenges as “must-haves” as we kick off the year is essential to an organization’s cybersecurity strategy. Here are some of the 10 things to know about cybersecurity in 2020. (If  you’re interested in hearing more, register for…

February 4, 2020 | Javier Ruiz

Why should you use correlation rules on top of traditional signatures?

The AT&T Cybersecurity Alien Labs team is in charge of writing correlation rules and releasing threat intelligence updates on a day-to-day basis. When researchers in the team find new malware families or threats, we always try to find the best approach to keep our customers protected. In this blog, we will look into some of the differences between…

February 3, 2020 | Randy Burkhead

NO FATE

“The future is not set, there is no fate but what we make for ourselves.” John Connor, Terminator 2 There is a prevailing viewpoint among security professionals that security breaches are inevitable. They have adopted the mantra, “It is not a matter of if but a matter of when.” As recently as the day I wrote this…

January 31, 2020 | Bob Covello

A new twist on “Parental consent”

An independent guest blogger wrote this blog. I was at breakfast the other day with some family friends, and the topic of genealogy came up.  Over the past few years, various sites have sprouted up that offer to trace your origins all the way back in time; in some cases, all the way back to the eras of early…

Safely downloading applications and more | ThreatTraq Essentials

Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers. I really enjoy them; you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent feature on ThreatTraq. The video features Don Heatley, Principal Technology Security, AT&…

January 28, 2020 | Kate Brew

Do you need certifications to get an InfoSec job?

I’ve seen Tweets and heard many discussions about certifications, like CISSP, CEH, OSCP  and so on, in InfoSec. No doubt certifications have value – in many situations hiring managers are quickly going through resumes and certifications are symbolic of at least book-learning, and some degree of dedication to InfoSec. Certifications can be expensive and time consuming so having them clears…

January 27, 2020 | David Smith

How Smart Cards Work

An independent guest blogger wrote this blog. In this modern age, there’s been a significant improvement in the digitization of traditional payment methods. We live in a technologically advanced era, and as such, advancements in payment infrastructures makes life easier, transactions faster, swifter, and smoother. Almost all countries in the world are adopting the cashless economy policy. Smart cards…

January 23, 2020 | Devin Morrissey

Healthcare security: How can blockchain help?

This is part 2 of a blog on healthcare security. For more info, check out part 1. An independent guest blogger wrote this blog. When it comes to data security, there is no more important place than the healthcare industry. When people go to the doctor, they provide all of their most sensitive information, from their health issues to their phone…

Watch a Demo ›
Get Price Free Trial