Working from home - new reality for even small businesses

April 20, 2020 | Kate Brew
Kate Brew

Kate Brew

Editor-in-chief, AlienVault blog

Kate has over 15 years experience in product management and marketing, primarily in information security.

April 20, 2020 | Kate Brew

Working from home - new reality for even small businesses

I’m very fortunate in the COVID-19 situation. My job as editor of the AT&T Cybersecurity blog lends itself well to working from home. In fact, even before the virus I had the privilege to work from home some of the time – of course with a VPN and other security measures, on company equipment. The biggest…

January 28, 2020 | Kate Brew

Do you need certifications to get an InfoSec job?

I’ve seen Tweets and heard many discussions about certifications, like CISSP, CEH, OSCP  and so on, in InfoSec. No doubt certifications have value – in many situations hiring managers are quickly going through resumes and certifications are symbolic of at least book-learning, and some degree of dedication to InfoSec. Certifications can be expensive and time consuming so having them clears…

Get the latest security news in your inbox.

Subscribe via Email

January 10, 2020 | Kate Brew

Top 10 AT&T Cybersecurity blogs of 2019

Happy New Year! What a year 2019 was in cybersecurity. It was a great year for informative and interesting blogs. Here were the top performing AT&T Cybersecurity blogs written in 2019:  1. The Great Cannon has been deployed again by Chris Doman took the top spot! 2. AT&T Cybersecurity is Born by our CEO, Barmak Meftah…

August 19, 2019 | Kate Brew

What is r00tz Asylum?

At Black Hat 2019 I had the pleasure to meet some AT&T colleagues who are now my new InfoSec buddies! I met Marc Kolaks and Don Tripp from the Office of the CSO at the AT&T Cybersecurity booth. They told me about the weekend event they were volunteering for at Defcon. So, being nosy I had to…

June 18, 2019 | Kate Brew

SOAR with AT&T Cybersecurity and Dark Reading

Watch the full video on our site. If you prefer reading, here’s the full transcript 😊 Terry Sweeney - Contributing Editor, Dark Reading Sanjay Ramnath - Associate Vice President, Product Marketing, AT&T Cybersecurity Terry Sweeney: Welcome back to the Dark Reading News Desk. We’re here at the RSA Conference in…

June 12, 2019 | Kate Brew

Infosecurity Europe 2019

AT&T Cybersecurity had a big presence at Infosecurity Europe 2019 in London, June 4-6. Our theme was unifying security management with people, process and technologies. While the industry is generally moving in the right direction, IT teams still struggle with being overwhelmed on the technology side, not knowing where to begin on the process side, and finding (or being…

May 14, 2019 | Kate Brew

Confidence: the perception and reality of cybersecurity threats

At RSA 2019, we conducted a survey that netted 733 respondents along with interviews between Javvad Malik, former security advocate at AT&T Cybersecurity, and security experts. The full results are in his comprehensive and informative research report. Following are a few highlights: Internal threats Phishing is the clear “winner” here. At 29%, nearly a third cited phishing as the…

March 26, 2019 | Kate Brew

Great find! The ThreatTraq Internet Weather Report

Every week, the AT&T Chief Security Office produces a set of videos with helpful information and news commentary for InfoSec practitioners and researchers.  I really enjoy them, and penned a blog on a segment on the impact the banning of smartphones in some secure federal facilities  a few weeks ago. The Internet Weather Report is a…

March 8, 2019 | Kate Brew

Ban on Smartphones in Secure Federal Facilities

The Federal ban on smartphones for some employees in the workspace makes a lot of sense in post-Snowden days. The phone has a camera, microphone, Bluetooth and other capabilities that can be abused, with or without the employee even intending harm. AT&T ThreatTraq did a six-minute video I really enjoyed. ThreatTraq is a production of the…

February 21, 2019 | Kate Brew

Fileless Malware Detection: A Crash Course

Given you’re here, you’re likely new to this topic, so please be aware in that fileless malware, fileless malware attack, and fileless attack are different words for the same thing. With that clear, let’s jump in!  What is Fileless Malware and How Does It Work? There are many definitions of a fileless malware attack. I like the…

February 11, 2019 | Kate Brew

Managed Security Trends and Usage

New infographic! The full report is here. …

January 20, 2019 | Kate Brew

Reverse Engineering Malware

The Alien Labs team does a lot of malware analysis as a part of their security research. I interviewed a couple members of our Labs team, including Patrick Snyder, Eddie Lee, Peter Ewane and Krishna Kona, to learn more about how they do it. Here are some of the approaches and tools and techniques they use for reverse engineering malware,…