June 18, 2021 | Bindu Sundaresan

Risk-based security now more important than ever for Energy and Utilities!

This is the third of three blogs in a series to help the energy and utility industries. You can read the first blog on Ransomware and Energy and Utilities and the second blog on Threat Intelligence and Energy and Utilities as well. Convergence of IT/OT is now a reality: Whether intentional or accidental, IT and operational technology (OT) are…

June 16, 2021 | Irfan Shakeel

How Zero Trust architecture improves the organization’s network security

This blog was written by an independent guest blogger. In the cybersecurity field, Zero Trust is becoming a widely used model. Data breaches taught organizations to stay cautious regarding security, especially when it comes to information protection - and a Zero Trust model may be the best option. Nobody, including clients inside the firewall, should be trusted,  per Zero…

June 15, 2021 | Palo Alto Networks

Palo Alto Networks teams with AT&T to deliver managed SASE

Remote workforces accessing applications and data that are located anywhere is the “new normal.” Across the globe, organizations of all sizes are struggling to modernize their infrastructures to accommodate this new reality while accelerating their digital transformation initiatives. As a result, today’s overly fragmented environments and markets make this transformation complicated, leaving many organizations unable to…

June 14, 2021 | Fernando Martinez

Malware hosting domain Cyberium fanning out Mirai variants

Executive summary AT&T Alien Labs has observed the Mirai variant botnet, known as Moobot, scanning for known but uncommon vulnerabilities in Tenda routers, resulting in a considerable peak in our internal telemetry. The research associated with this peak resulted in the discovery of a malware hosting domain, providing several different Mirai variants, like Moobot and Satori. Key points: …

June 10, 2021 | Theresa Lanowitz

Threat Intelligence and Energy and Utilities

This is the second in a blog series dedicated to the energy and utility industries. Read the first blog in the series here. Introduction It is increasingly common to hear about cyber threats to energy and utility industries. These are malicious acts by adversaries that target our data, intellectual property, or other digital assets. All too often it seems as…

June 9, 2021 | Theodoros Karasavvas

Are fraudsters using automation to execute mass cyber-attacks?

This blog was written by an independent guest blogger. As our digital world turns toward advances in automated technology to increase efficiency and productivity, cybercriminals are also learning how to execute mass automated cyber-attacks.  According to the 2021 AT&T Cybersecurity Insights Report, most people are concerned about the security of various applications and 52% believe that these threats challenge…

June 8, 2021 | Irfan Shakeel

Magic in Cybersecurity: Magic links to replace the password

This blog was written by an independent guest blogger. These days, magic links are in the air. They are becoming an intriguing means to strengthen digital security without inconveniencing users. This article discusses magic links, their magical function, and their potential benefits for a corporation. Magic links Magic links are authorized URLs that carry a token which grants accessibility to…

June 7, 2021 | Devin Partida

7 Challenges in modern Cybersecurity and how to fix them

This blog was written by an independent guest blogger.   Cybersecurity is a leading concern for any business today. While this trend has made IT security a secure and potentially lucrative field, modern cybersecurity professionals also face growing challenges. If you hope to keep your business safe amid rising threats, you’ll have to overcome these obstacles. In that…

June 4, 2021 | Ziv Hagbi

SentinelOne Advanced AlienApp 

In today’s threat landscape there is no escape from having a 360° view to protect crucial organization assets. The criticality of the matter is greatly amplified in these times where working remotely has become vastly common among Enterprises and SMBs alike.  An ideal security solution would combine threat detection & response on cloud resources as well as…

June 4, 2021 | Mark Stone

Digital transformation explained

This article was written by an independent guest author. No matter what sector your organization does business in, you’ve probably heard the term digital transformation. In every industry, digital transformation is going to be critical to remain competitive and resilient. But what does digital transformation mean? And how does cybersecurity fit in? Today’s organizations are facing…

June 3, 2021 | Theresa Lanowitz

Ransomware and Energy and Utilities

This is a blog series focused on providing energy and utility industries with helpful insights and practical, helpful information on cybersecurity. Intro The exponential growth of IoT devices in the energy and utilities industry has greatly increased focus on cybersecurity. Focus on cybersecurity across industries has increased recently, no doubt due to factors like COVID-19 forcing a jump in remote…

June 2, 2021 | Jeff Otchis

Introducing AT&T USM Anywhere Advisors

As environments evolve and cybercriminals become more sophisticated, threat detection and response is becoming increasingly complex. While some organizations are turning to a fully managed detection and response solution, many others with established internal security teams are looking for additional support and expert guidance, while still keeping their program in-house. Our new service, AT&T USM Anywhere Advisors, is…