Just released! AT&T Cybersecurity Insights™ Report: 5G and the Journey to the Edge

December 8, 2020 | Tawnya Lancaster
Tawnya Lancaster

Tawnya Lancaster

Tawnya joined AlienVault as a Senior Product Marketing Manager in 2018. Previously, she served as the Director of Global Communications for Skybox Security, where she specialized in cybersecurity thought leadership for the vulnerability and threat management and firewall and security policy management space. She graduated from Oregon State University with a B.A. in English and has received certification in Stanford’s Professional Publishing course, an intensive program for established publishing and communication professionals.

December 8, 2020 | Tawnya Lancaster

Just released! AT&T Cybersecurity Insights™ Report: 5G and the Journey to the Edge

We are certainly in unique times, with COVID driving digital transformation at an unprecedented pace, remote work appearing to be long term, and the specter of new threats looming over security professionals as they strategized how to protect a rapidly changing business and tech landscape.  To use perhaps one too many cliches: it is the best of times, it…

September 23, 2020 | Tawnya Lancaster

IDC MarketScape Names AT&T a Leader in Worldwide Managed Security Services

IDC recently published the IDC MarketScape: Worldwide Managed Security Services 2020 Vendor Assessment, in which primary author Martha Vazquez and team studied 17 organizations that offer MSS globally. The report provides a comprehensive look at MSSP vendors, including AT&T, and how managed security services are evolving to meet the needs of customers today. This is especially relevant as security teams…

Get the latest security news in your inbox.

Subscribe via email


August 10, 2020 | Tawnya Lancaster

Cyber threat intelligence explained

The cybersecurity industry is increasingly producing enormous amounts of raw threat data. The sheer volume of information threat researchers must sift through makes it difficult to collect, analyze, and research that data in a timely manner. This in turn limits their ability to understand what data is valid and useful and whether threat artifacts will result in legitimate threat indicators. …

July 1, 2020 | Tawnya Lancaster

New report: COVID-19 Threat Intelligence Insight from the Telco Security Alliance

AT&T Cybersecurity along with three members of the Telco Security Alliance (TSA) published a new report today, “COVID-19 Insight from the Telco Security Alliance.” The report provides insight into some of the threat groups (as well as analysis of their campaigns) that are taking advantage of the global pandemic while nations and organizations are vulnerable. TSA…

June 2, 2020 | Tawnya Lancaster

Threat hunting explained: what is cyber threat hunting?

What is threat hunting? The process of threat hunting involves proactively searching for malware or attackers that are hiding within a network. Rather than simply relying on security solutions or services to detect threats, threat hunting is a predictive element to a layered security strategy, empowering organizations to go on the offensive looking for threats. Threat hunting is typically carried…

May 12, 2020 | Tawnya Lancaster

The relationship between security maturity and business enablement

A seminal report exploring the correlation between cybersecurity and positive business and security outcomes Now more than ever organizations globally want to better understand, manage, and minimize security risks. To achieve this, security leaders should be regularly assessing their processes and programs to gain a sense of their organization’s security maturity, where gaps exist, and what can be…

May 11, 2020 | Tawnya Lancaster

A HIPAA Compliance Checklist

Five steps to ensuring the protection of patient data and ongoing risk management. Maintaining security and compliance with HIPAA, the Health Insurance Portability and Accountability Act, is growing ever more challenging. The networks that house protected health information (PHI or ePHI) are becoming larger and more complex — especially as organizations move data to the cloud. At the same time,…

November 22, 2019 | Tawnya Lancaster

5G is coming, are you prepared?

5G technologies and networks are bringing exciting new possibilities for the enterprise. Many organizations are taking a proactive stance by anticipating the security requirements that will come with the new technology. Given the multifaceted nature of 5G and security, it’s critical for organizations to understand the magnitude of this undertaking.  You can check out a recent blog…

July 9, 2019 | Tawnya Lancaster

A peek into malware analysis tools

So, what is malware analysis and why should I care? With the commercialization of cybercrime, malware variations continue to increase at an alarming rate, and this is putting many a defender on their back foot. Malware analysis — the basis for understanding the inner workings and intentions of malicious programs — has grown into a complex mix of technologies in…

May 1, 2019 | Tawnya Lancaster

Who’s phishing in your cloud? And, some suggestions for detecting it

An example of how to detect platform or service attacks Oh, the places we go . . . with apps in the cloud.   A comprehensive, six-month study released by Proofpoint, in March reports that (oh, to our surprise), attackers are “leveraging legacy protocols and credential dumps to increase the speed and effectiveness of brute …

January 31, 2019 | Tawnya Lancaster

APT10 Group Targets Multiple Sectors, But Seems to Really Love MSSPs

Threat Actors That Don’t Discriminate  When it comes to threat actors and the malware variants they use, let’s talk dating — or rather, the way people date — because one could argue there are marked similarities between the two. You see, there are criminal groups who have a “type,” i.e. using malware…

December 20, 2018 | Tawnya Lancaster

Let’s Chat: Healthcare Threats and Who’s Attacking

Healthcare is under fire and there’s no sign of the burn slowing. Look, it’s no secret that hackers have been targeting hospitals and other healthcare providers for several years — and probably no surprise that healthcare is one of the top target industries for cybercrime in 2018. In the US alone, in fact, more than 270 data breaches affecting nearly 12 million…