August 18, 2020 | Devin Morrissey

Security concerns and solutions regarding blockchain use in healthcare

This blog was written by an independent guest blogger. Image Source: Pexels The healthcare industry is transforming with the integration of ground-breaking technologies capable of storing patient records electronically. The shift to the digitization of systems makes a variety of healthcare solutions possible that never could have been imagined — but it also puts healthcare data at risk to hackers…

August 17, 2020 | Clint Harris

Cloud security

Introduction / Overview There’s no doubt that the adoption of public cloud deployments has accelerated for most organizations recently. In fact, according to metrics released by Oracle recently, nearly half (49%) of all respondents to the Oracle and KPMG Cloud Threat Report expect to store most of their data in a public cloud by the end of 2020. Effectively managing…

Get the latest
security news
in your inbox.

Subscribe via email

  RSS  

August 14, 2020 | Kate Brew

The Forrester Wave™: Global Managed Security Services Providers, Q3 2020

AT&T Cybersecurity is ranked among the top managed security service providers in The Forrester WAVE™: Global Managed Security Services Providers, Q3 2020. Among the findings, Forrester recommends customers look for MSSPs that can offer remediation support across hybrid environments and help create efficiencies within your environment. AT&T Cybersecurity managed security services offers: Visibility and coverage across…

August 13, 2020 | Rich Langston

AlienApps and plug-ins combined into one framework

The heart of any detection and response solution is the ability to collect events from the environment, perform corrective response actions, and integrate with customer workflows. Today, we’re proud to announce the launch of a complete redesign of the user interface for these third party integrations.  We’ve updated our design to make it easier for…

August 12, 2020 | Mark Stone

What is endpoint protection? Endpoint security explained

This blog was written by a third party author. 5G is here and changing the way business is done. With this comes an increase of devices to take advantage of low latency and high bandwidth that will allow businesses to truly transform. Because of those devices, the attack surface is also rapidly expanding and will increase opportunities for bad actors.…

August 12, 2020 | Falan Memmott

Being onsite for an assessment is better, but a lot of it is possible remotely

The way we shop for groceries has changed because of the unusual circumstances the world is in today. Instead of spending as much time physically in the store selecting our own items, we now have the option to order online and arrange for a time to pick them up, or better yet, have them delivered. Of course, there may be…

August 10, 2020 | Tawnya Lancaster

Cyber threat intelligence explained

The cybersecurity industry is increasingly producing enormous amounts of raw threat data. The sheer volume of information threat researchers must sift through makes it difficult to collect, analyze, and research that data in a timely manner. This in turn limits their ability to understand what data is valid and useful and whether threat artifacts will result in legitimate threat indicators. …

August 10, 2020 | Ericka Chickowski

Cybersecurity risk management explained

This blog was written by a third party author What is cybersecurity risk management? Cybersecurity risk management is the practice of prioritizing cybersecurity defensive measures based on the potential adverse impact of the threats they're designed to address. Establishing a risk management approach to cybersecurity investment acknowledges that no organization can completely eliminate every system vulnerability or block every…

August 10, 2020 | Rakesh Shah

Don’t call it a SIEM – How USM Anywhere does threat detection and response differently

Security Information and Event Management (SIEM) solutions have been the foundation of enterprises’ security operations and threat detection & response.  Even though USM Anywhere has many key SIEM features, it is much more than a SIEM. Why?  To perform threat detection, SIEMs and purpose-built threat consoles collect data from security devices. These include network firewalls, endpoint devices, …

August 6, 2020 | Chris Johnson

How to secure Syslog with USM Anywhere

One of the requests we often get is how to securely forward logs to the USM sensor. To forward logs securely, the one component that is required is an SSL certificate. By default, USM has a self-signed certificate that will allow sending secure logs over port 6514. Some platforms, such as Palo Alto Networks, require publicly signed certificates by default. In…

August 5, 2020 | Mike Banic

Combat mobile phishing attacks targeting Financial Services with AI

Phishing attacks are a common attack vector for financial services organizations. Effective and simple to launch, phishing attacks challenge financial firms to protect their mobile workforce and harden their customer-facing apps. Mobile phishing, in particular, bypasses traditional perimeter defenses such as secure email gateways by targeting users via personal email, SMS and social messaging apps. These attacks typically seek to…

August 4, 2020 | Edwardo Rodriguez

Stories from the SOC: Compromised account detected

Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive Summary The Managed Threat Detection and Response (MTDR) analyst team was notified of multiple logins from different countries. With the shift to a…