October 4, 2021 | Devin Partida

How to better secure user authentication protocols

This blog was written by an independent guest blogger. In March 2021, cybersecurity researcher Le Xuan Tuyen discovered a security bug in Microsoft Exchange Server. The vulnerability, dubbed ProxyToken, lets attackers bypass the authentication process to access victims’ emails and configure their mailboxes. Normally, Exchange uses two sites, a front and back end, to authenticate users. However, its Delegated Authentication…

October 1, 2021 | Mark Stone

What is advanced persistent threat? Explaining APT security

This article was written by an independent guest author. As the threat landscape evolves faster than we can keep up with, organizations must be aware of the type of threats they may face. Certain threat types, like ransomware and malware, are more prominent and therefore must be fought with the appropriate resources. On the other hand, some threat types are…

September 30, 2021 | David Balaban

Introduction to SAST

This blog was written by an independent guest blogger. DevSecOps means countering threats at all stages of creating a software product. The DevSecOps process is impossible without securing the source code. In this article, I would like to talk about Static Application Security Testing (SAST). As development fluency is growing every year, many companies are introducing DevSecOps. Its main message…

September 29, 2021 | Nahla Davies

How to shift into a new approach to cybersecurity asset management

This blog was written by an independent guest blogger. The effects of the global pandemic pushed organizations to accelerate their digital transformation strategies. Because of this, companies in all industries were faced with an array of new technologies like cloud and containers that support the shift to edge computing and remote workers. With so much focus on these factors, companies…

September 28, 2021 | Rich Langston

Considerations when choosing an XDR solution

Introduction Cybersecurity is a fast-moving space.  In fact, it’s hard to think of a time that security has been moving more quickly. As we continue to move into the cloud, work from home, and otherwise continue the digital transformation of our businesses, additional capabilities are needed as new threats are discovered. One of these needs is greater…

September 27, 2021 | Kate Brew

AT&T Business Summit is virtual Oct. 27-28 and free!

We know that many of us couldn't wait to reconnect in person. However, the health and safety of our guests will always be our top priority. Given the continued uncertainties around the pandemic, the AT&T Business Summit will be exclusively virtual this year. And it’s jam-packed with cybersecurity talks! Given how critical security is to…

September 23, 2021 | Irfan Shakeel

Network traffic analysis using Wireshark

This blog was written by an independent guest blogger. Network traffic analysis is the routine task of various job roles, such as network administrator, network defenders, incident responders and others. Wireshark plays a vital role during the traffic analysis; it comes pre-installed in many Linux OS’s, for instance, Kali. otherwise, it is available to download from the…

September 22, 2021 | Belinda Streak

The meaning behind XDR: A beginner’s guide to extended detection and response

Where we are In the world of threat detection and response, alert fatigue and tool sprawl are real problems. Security professionals are struggling to manage different tools and control points and still relying on manual processes, which results in security that is fragmented and reactive. Analysts need better visibility and control, more context, and better use of automation so they…

September 21, 2021 | Karoline Gore

Through edtech, society’s cybersecurity ability is heading up a notch

Photo by Marvin Meyer on Unsplash This blog was written by an independent guest blogger. Edtech is helping to provide children and adults all over the world with new and updated skills and knowledge. One important area it’s helping with is cybersecurity. A recent report by Forbes gave the opinion that edtech would provide the…

September 20, 2021 | Bindu Sundaresan

Cybersecurity first: Business and consumer

A cybersecurity program isn’t just about securing your assets. It is an asset.  Security is everyone’s responsibility, from the consumer to a business. Here are some best practices from a consumer's view. It all starts with locking down your login credentials Review your passwords, updating them as needed, and ensuring they are…

September 15, 2021 | Bindu Sundaresan

Thrive today with not just being smart but being cyber smart

Photo by Cytonn Photography on Unsplash Cybersecurity is everyone’s responsibility: Don’t just be smart, be cyber smart In our digital age, cybersecurity is everyone’s responsibility. Every device you use, the app you download, the bit of information you share, or the message you open comes with a certain amount of risk.…

September 14, 2021 | Irfan Shakeel

A guide to OWASP’s secure coding

This blog was written by an independent guest blogger. Modern organizations rely heavily on software and systems. Secure coding standards are significant, as they give some assurance that software installed on the organization’s system is protected from security flaws. These security standards, when used correctly, can avoid, identify, and remove loopholes that might jeopardize software integrity. Furthermore, whether…