What is URL filtering? Web filtering explained

January 7, 2021 | Ericka Chickowski
Ericka Chickowski

Ericka Chickowski

An award-winning freelance writer, Ericka Chickowski specializes in telling stories about the intersection of information technology and business innovation. Her perspectives on cybersecurity have appeared in numerous trade and consumer magazines, including Dark Reading, Entrepreneur, InformationWeek, and Security Boulevard.

June 30, 2020 | Ericka Chickowski

Cybersecurity penetration testing explained: what is pen testing?

This blog was written by a third party author. What is penetration testing? Cybersecurity penetration testing is a method of checking for security weaknesses in software and systems by simulating real-world cyber-attacks. Also known colloquially as 'pen tests,' penetration tests probe beyond the scope of automated vulnerability scans. Pen tests find gaps in protection that can arise when unique combinations…

June 25, 2020 | Ericka Chickowski

SD-WAN security explained

This blog was written by a third party author and does not reflect the opinions of AT&T. What is SD-WAN? Software-defined wide area networking (SD-WAN) is a distributed networking approach that provides organizations a sustainable alternative to high latency hub-and-spoke network topologies. How SD-WAN supports network performance Legacy hub-and-spoke networks backhaul branch office traffic to a centralized data…

Get the latest security news in your inbox.



June 18, 2020 | Ericka Chickowski

Benefits of a security operations center (SOC)

This blog was written by an independent guest blogger. Why having a SOC is paramount A well-run security operations center (SOC) stands as the central nervous system of an effective cybersecurity program. SOCs serve as a hub of organization-wide detection and response capabilities for the people tasked with stopping cyber threats within their organization. While the everyday duties of the…