View all AT&T Business Products ⟶
  • Contact
  • Support
AT&T Business
AT&T Business
AT&T Cybersecurity
Contact us
  • Products
    • Cybersecurity Consulting Services

      Cyber Strategy

      • Strategy and Roadmap Planning
      • Enterprise Security Assessment Services
      • Risk-based Cyber Posture Assessment

      Risk and Compliance

      • Security Compliance

      Vulnerability and Threat Management

      • Managed Vulnerability Program
      • Penetration Testing
      • Adversary Simulation Services
      • Incident Response Services

      CSO Advisory Services

      • Cybersecurity IQ Training
    • Managed Security Services

      Network Security

      • Secure Web Gateway
      • Secure Remote Access
      • SASE Branch with Fortinet
      • SASE with Palo Alto Networks
      • Reactive Distributed Denial of Service Defense
      • View All

      Threat Detection

      • Managed Threat Detection and Response

      Endpoint Security

      • SentinelOne
      • Ivanti (MobileIron)
      • Lookout Mobile Endpoint Security
    • Network Security

      AT&T Trusted Internet Access

      • Secure Web Gateway
      • Secure Remote Access
      • Bundled Security Services with Check Point
      • Network Based Firewalls
      • Premises Based Firewalls
      • Premises-Based Firewall Express with Check Point
      • Enhanced Cybersecurity Services

      AT&T Infrastructure and Application Protection

      • Reactive Distributed Denial of Service Defense
      • ACDN Prolexic DDoS
    • Endpoint Security

      Endpoint Security

      • SentinelOne
      • Ivanti (MobileIron)
      • VMware Workspace ONE®
      • IBM MaaS360
      • Lookout Mobile Endpoint Security
      • McAfee Endpoint Protection
      • Samsung Knox
    • Threat Detection and Response

      AT&T Threat Solutions

      • Managed Threat Detection and Response
      • Threat Detection and Response for Government
      • USM Anywhere
      • USM Anywhere Advisors
      • XDR for MSSPs
      • USM Anywhere Integrations
      AT&T Alien Labs logo

      Powered by
      AT&T Alien Labs

    • Web Application and API Protection
       
    • Modernizing Network Security
       
  • Solutions
    • See All Solutions

    Compliance

    • Overview
    • GDPR
    • HIPAA
    • ISO 27001
    • PCI DSS
    • SOC 2

    Industry

    • Education
    • Energy Sector
    • Federal
    • Financial Services
    • Healthcare
    • Manufacturing
    • MSSPs
    • Retail

    Environment

    • 5G
    • AWS
    • Azure
    • Cloud
    • IOT/Mobility
    • Hybrid
    • Network
    • Remote Workforce

    Security Use Cases

    • Intrusion Detection
    • Secure Access Service Edge
    • Secure Web Gateway
    • SIEM Platform Solutions
    • XDR
    • Zero Trust Architecture
    View All Solutions ⟶
  • Partners
    • Become a Partner

    Channel Partners

    • All Partner Programs
    • MSSP Program
    • Reseller Program
    • Professional Services
    • Partner Portal Login

    Technology Partners

    • OTX Partners
    • Managed Security Partners
    Become a Partner ⟶
  • Resources
    • View All Resources

    Product Resources

    • Customer Stories
    • Product Briefs
    • Solution Briefs
    • Use Cases
    • Free Trial

    Security Resources

    • Analyst Reports
    • Blogs
    • eBooks
    • Videos
    • Webcasts
    • White Papers

    Customer Resources

    • Success Center
    • Certification
    • Customer Success
    • Documentation
    • Professional Services
    • Support Overview
    • Training

    Browse by Topic

    • Incident Response
    • Intrusion Detection
    • Partner: MSSP & Reseller
    • Regulatory Compliance
    • Security Operations Center
    • SIEM & Log Management
    • Threat Detection
    • Threat Intelligence
    View All Resources ⟶
  • AT&T Alien Labs
  • Contact
  • Support
Get price
  1. AT&T Cybersecurity services
  2. Blog
  3. AT&T Security Essentials Blog

Security essentials

  • Categories:
  • All blogs
  • Security essentials
  • AT&T Alien Labs research
Categories
  • All blogs
  • Security essentials
  • AT&T Alien Labs research
Strengthening Cybersecurity for small and medium-sized businesses: The importance of Security Orchestration, Automation, and Response (SOAR)
Security Essentials
Strengthening Cybersecurity for small and medium-sized businesses: The importance of Security Orchestration, Automation, and Response (SOAR)
Oct 3, 2023   |   Vertek Corporation
Read ⟶
AT&T Cybersecurity: championing global cybersecurity education & awareness
Security Essentials
AT&T Cybersecurity: championing global cybersecurity education & awareness
Oct 2, 2023   |   Jen Carole
Read ⟶
Building edge computing for manufacturing - the video
Security Essentials
Building edge computing for manufacturing - the video
Sep 29, 2023   |   Kate Brew
Read ⟶

2023 AT&T Cybersecurity Insights Report

Edge Ecosystem

Get the cybersecurity report ⟶

2023 AT&T Cybersecurity Insights Report
MMRat: A new banking trojan
Security Essentials
MMRat: A new banking trojan
Sep 28, 2023   |   Arjun Patel
Read ⟶
Combining IT and OT security for enhanced cyber risk management
Security Essentials
Combining IT and OT security for enhanced cyber risk management
Sep 27, 2023   |   Irfan Shakeel
Read ⟶
Fortifying your wireless network: A comprehensive guide to defend against wireless attacks
Security Essentials
Fortifying your wireless network: A comprehensive guide to defend against wireless attacks
Sep 26, 2023   |   Kushalveer Singh Bachchas
Read ⟶
Ensuring vendor integrity: Why the cloud shouldn’t be your only backup
Security Essentials
Ensuring vendor integrity: Why the cloud shouldn’t be your only backup
Sep 25, 2023   |   Zachary Curley
Read ⟶
​​​​​​​Beyond the firewall: Navigating SaaS security challenges
Security Essentials
​​​​​​​Beyond the firewall: Navigating SaaS security challenges
Sep 21, 2023   |   Kushalveer Singh Bachchas
Read ⟶
Get the AT&T Cybersecurity Insights Report: Focus on Manufacturing
Security Essentials
Get the AT&T Cybersecurity Insights Report: Focus on Manufacturing
Sep 20, 2023   |   Theresa Lanowitz
Read ⟶
1 2 3 › ››
AT&T Business
From the Blog
Vertek Corporation

Vertek Corporation

Oct 3, 2023

Strengthening Cybersecurity for small and medium-sized businesses: The importance of Security Orchestration, Automation, and Response (SOAR)

Explore All Blog Posts ›
Twitter LinkedIn Facebook Youtube Instagram
Who We Are
  • Alien Labs
  • Careers
  • Contact Us
News
  • Newsroom
  • Events
  • Blogs
Partners
  • Partner Programs
  • Partner Portal
Products
  • AT&T Managed Threat Detection and Response
  • USM Anywhere
  • XDR for MSSPs
  • Open Threat Exchange (OTX)
  • OSSIM
Solutions
  • Cloud Security Monitoring
  • Threat Detection
  • Intrusion Detection
  • SIEM platform solutions
  • Vulnerability Assessment
  • See All Solutions
Resources
  • Resources
  • Blogs
  • Customer Reference Guide
Customer Success
  • Support & Services
  • Success Center
  • Documentation Center
  • Training
  • Certification
Contact us

© Copyright 2023

  • Privacy Policy
  • Website Terms of Use
  • GDPR
  • Cookie Policy
  • Your Privacy ChoicesCalifornia Consumer Privacy Act (CCPA) Opt-Out Icon

We use cookies to provide you with a great user experience. By using our website, you agree to our Privacy Policy and Website Terms of Use.