What is a Cloud Access Security Broker? CASB explained

November 5, 2020 | Ericka Chickowski
Ericka Chickowski

Ericka Chickowski

An award-winning freelance writer, Ericka Chickowski specializes in telling stories about the intersection of information technology and business innovation. Her perspectives on cybersecurity have appeared in numerous trade and consumer magazines, including Dark Reading, Entrepreneur, InformationWeek, and Security Boulevard.

November 5, 2020 | Ericka Chickowski

What is a Cloud Access Security Broker? CASB explained

This blog was written by a third party author. What is a Cloud Access Security Broker (CASB)? A common component of modern cybersecurity infrastructure, a cloud access security broker (CASB) is technology that provides monitoring and mitigates risks from employee use of cloud services. CASBs were initially developed to fill a gap in cloud security visibility left behind by traditional…

October 30, 2020 | Ericka Chickowski

What is Smishing? SMS phishing explained

This blog was written by a third party author. What is SMS phishing? SMS phishing, or “Smishing,” is a mobile phishing attack that targets victims via the SMS messaging channel rather than through email. A natural evolution of the phishing phenomenon, smishing attacks attempt to dupe mobile users with phony text messages containing links to legitimate looking, but…

Get the latest
security news
in your inbox.

Subscribe via email

RSS

October 2, 2020 | Ericka Chickowski

Deep packet inspection explained

What is deep packet inspection? Deep packet inspection (DPI) refers to the method of examining the full content of data packets as they traverse a monitored network checkpoint. Whereas conventional forms of stateful packet inspection only evaluate packet header information, such as source IP address, destination IP address, and port number, deep packet inspection looks at fuller range of data…

September 24, 2020 | Ericka Chickowski

BYOD security explained: what is a BYOD policy?

This blog was written by a third party author What is bring your own device (BYOD)? Bring your own device (BYOD) describes the practice of using a personal device such as a smartphone or tablet to conduct business on an organization's network or with its data. Organizations constantly walk a tightrope with their BYOD policies to balance employee productivity…

September 17, 2020 | Ericka Chickowski

What is DDoS mitigation and how does it work?

This blog was written by a third party author. Distributed denial of service (DDoS) attacks are a favorite method for attackers to disrupt or debilitate firewalls, online services, and websites by overwhelming systems with malicious traffic or transaction requests. DDoS attackers accomplish this by coordinating an army of compromised machines, or 'bots', into a network of devices they control from…

August 25, 2020 | Ericka Chickowski

Security risk assessments explained

This blog was written by a third party author. What is a security risk assessment? A security risk assessment is a formal method for evaluating an organization's cybersecurity risk posture. Comprehensive security risk assessments take stock in business objectives, existing security controls, and the risk environment in which the business operates. When done well, the assessment identifies security gaps…

August 10, 2020 | Ericka Chickowski

Cybersecurity risk management explained

This blog was written by a third party author What is cybersecurity risk management? Cybersecurity risk management is the practice of prioritizing cybersecurity defensive measures based on the potential adverse impact of the threats they're designed to address. Establishing a risk management approach to cybersecurity investment acknowledges that no organization can completely eliminate every system vulnerability or block every…

July 14, 2020 | Ericka Chickowski

DDoS attack prevention and protection explained

This blog was written by a third party author. Why DDoS prevention is paramount Distributed denial of Service (DDoS) attacks stand as some of the most disruptive and costly cyberattacks that organizations face on a regular basis. Cyber criminals use DDoS attacks to make websites and other online services unavailable for legitimate use. They do this by coordinating a flood…

July 8, 2020 | Ericka Chickowski

Types of DDoS attacks explained

This blog was written by a third party author and does not reflect the opinions of AT&T The general types of DDoS attacks Distributed denial of service (DDoS) is a broad class of cyberattack that disrupts online services and resources by overwhelming them with traffic. This renders the targeted online service unusable for the duration of the DDoS…

June 30, 2020 | Ericka Chickowski

Cybersecurity penetration testing explained: what is pen testing?

This blog was written by a third party author. What is penetration testing? Cybersecurity penetration testing is a method of checking for security weaknesses in software and systems by simulating real-world cyber-attacks. Also known colloquially as 'pen tests,' penetration tests probe beyond the scope of automated vulnerability scans. Pen tests find gaps in protection that can arise when unique combinations…

June 25, 2020 | Ericka Chickowski

SD-WAN security explained

This blog was written by a third party author and does not reflect the opinions of AT&T. What is SD-WAN? Software-defined wide area networking (SD-WAN) is a distributed networking approach that provides organizations a sustainable alternative to high latency hub-and-spoke network topologies. How SD-WAN supports network performance Legacy hub-and-spoke networks backhaul branch office traffic to a centralized data…

June 18, 2020 | Ericka Chickowski

Benefits of a security operations center (SOC)

This blog was written by an independent guest blogger. Why having a SOC is paramount A well-run security operations center (SOC) stands as the central nervous system of an effective cybersecurity program. SOCs serve as a hub of organization-wide detection and response capabilities for the people tasked with stopping cyber threats within their organization. While the everyday duties of the…