October 11, 2021 | Julius Charles

Stories from the SOC - Data exfiltration

Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive summary The impact of Data Exfiltration, which is the act of copying or transferring data from a computer or server without authorization, has…

October 7, 2021 | Bindu Sundaresan

Securing the edge with Zero Trust

The proliferation of cloud computing, mobile device use, and the Internet of Things has dissolved traditional network boundaries. Today, the network perimeter has evolved as workloads have moved to the cloud while non-managed, mobile devices have become the norm rather than the exception. The location of applications, users, and their devices are no longer static. Data is no longer confined…

October 6, 2021 | Ziv Hagbi

Introducing the Palo Alto Networks Panorama Advanced AlienApp

Here at AT&T Cybersecurity, we believe cyber protection should include multiple layers and cover as much ground as possible. Having full visibility into threats on the network and being able to automate actions against them not only reduces an organization’s risk but also frees up time for security teams to focus on other high-value security tasks. …

October 4, 2021 | Devin Partida

How to better secure user authentication protocols

This blog was written by an independent guest blogger. In March 2021, cybersecurity researcher Le Xuan Tuyen discovered a security bug in Microsoft Exchange Server. The vulnerability, dubbed ProxyToken, lets attackers bypass the authentication process to access victims’ emails and configure their mailboxes. Normally, Exchange uses two sites, a front and back end, to authenticate users. However, its Delegated Authentication…

October 1, 2021 | Mark Stone

What is advanced persistent threat? Explaining APT security

This article was written by an independent guest author. As the threat landscape evolves faster than we can keep up with, organizations must be aware of the type of threats they may face. Certain threat types, like ransomware and malware, are more prominent and therefore must be fought with the appropriate resources. On the other hand, some threat types are…

September 30, 2021 | David Balaban

Introduction to SAST

This blog was written by an independent guest blogger. DevSecOps means countering threats at all stages of creating a software product. The DevSecOps process is impossible without securing the source code. In this article, I would like to talk about Static Application Security Testing (SAST). As development fluency is growing every year, many companies are introducing DevSecOps. Its main message…

September 29, 2021 | Nahla Davies

How to shift into a new approach to cybersecurity asset management

This blog was written by an independent guest blogger. The effects of the global pandemic pushed organizations to accelerate their digital transformation strategies. Because of this, companies in all industries were faced with an array of new technologies like cloud and containers that support the shift to edge computing and remote workers. With so much focus on these factors, companies…

September 28, 2021 | Rich Langston

Considerations when choosing an XDR solution

Introduction Cybersecurity is a fast-moving space.  In fact, it’s hard to think of a time that security has been moving more quickly. As we continue to move into the cloud, work from home, and otherwise continue the digital transformation of our businesses, additional capabilities are needed as new threats are discovered. One of these needs is greater…

September 27, 2021 | Kate Brew

AT&T Business Summit is virtual Oct. 27-28 and free!

We know that many of us couldn't wait to reconnect in person. However, the health and safety of our guests will always be our top priority. Given the continued uncertainties around the pandemic, the AT&T Business Summit will be exclusively virtual this year. And it’s jam-packed with cybersecurity talks! Given how critical security is to…

September 23, 2021 | Irfan Shakeel

Network traffic analysis using Wireshark

This blog was written by an independent guest blogger. Network traffic analysis is the routine task of various job roles, such as network administrator, network defenders, incident responders and others. Wireshark plays a vital role during the traffic analysis; it comes pre-installed in many Linux OS’s, for instance, Kali. otherwise, it is available to download from the…

September 22, 2021 | Belinda Streak

The meaning behind XDR: A beginner’s guide to extended detection and response

Where we are In the world of threat detection and response, alert fatigue and tool sprawl are real problems. Security professionals are struggling to manage different tools and control points and still relying on manual processes, which results in security that is fragmented and reactive. Analysts need better visibility and control, more context, and better use of automation so they…

September 21, 2021 | Karoline Gore

Through edtech, society’s cybersecurity ability is heading up a notch

Photo by Marvin Meyer on Unsplash This blog was written by an independent guest blogger. Edtech is helping to provide children and adults all over the world with new and updated skills and knowledge. One important area it’s helping with is cybersecurity. A recent report by Forbes gave the opinion that edtech would provide the…