October 28, 2021 | Devin Partida

6 Business functions that will benefit from cybersecurity automation

This blog was written by an independent guest blogger. Enterprises and small businesses alike are facing challenges that impact their ability to maintain adequate cybersecurity. Budget constraints and limited staff are just a couple of reasons why businesses have become more susceptible to cyberattacks. Hackers are becoming smarter, and the tools that teams deploy are growing in number, leading to…

October 26, 2021 | Rupesh Chokshi

Every month should be Cybersecurity Awareness Month!

While October is famous for National Cybersecurity Awareness Month, and we provide resources and recommendations for our customers, really every month should focus on this business-critical topic. Given the frequency of Ransomware attacks, all industries need to be increasingly vigilant. This includes many aspects of cybersecurity, such as user training, endpoint security, network security, vulnerability management, and detection and response…

October 25, 2021 | Alicia Dietsch

Winner of the AT&T Diversity and Inclusion Champion Award 2021

.blog-content-area img { width: 200px!important; height: auto!important; } #WomeninCyber Todd Waskelis is the winner this year for his outstanding mentoring and building a highly diverse team! He’s built an extremely talented and diverse team with an endless tool chest of cybersecurity, business, and interpersonal skills. Todd is a magnet for diverse talent and achieves this through an organic…

October 20, 2021 | Bojan Bajic

Trends in connected homes in 2021 - Improved security and connectivity

This blog was written by an independent guest blogger. Intro It’s becoming more popular in 2021 to have a smart home with connected devices capable of communicating with each other. It’s expected that smart home spending will reach more than $141 billion by 2023, and the number of smart homes will surpass 300 million by 2023. Some connected home trends are…

October 19, 2021 | Lisa Ashjian

Introducing AT&T Managed Extended Detection and Response (XDR)

In today’s dynamic threat landscape, having different tools to meet unique security requirements helps keep data protected. However, businesses today have 10 to 50+ security tools and consequently spend too much time managing them instead of protecting against cybercrime. This security tool overload creates internal challenges and potentially distracts from the primary business mission.   AT&T Managed XDR…

October 18, 2021 | Irfan Shakeel

Hands-on domain password policy setup for Active Directory

This blog was written by an independent guest blogger. Dealing with the massive architecture of client-server networks requires effective security measures. Everyone has become painfully aware of all dangerous fishes roaming around the pool of the network, trying to get access to the system. Having a weak password policy is a key vector for attackers to gain system access. However,…

October 14, 2021 | Theodoros Karasavvas

FBI warns of ransomware gang – What you need to know about the OnePercent group

This blog was written by an independent guest blogger. The FBI recently published a warning stating that ransomware gang OnePercent Group has been attacking companies in the US since November 2020. This gang of cybercriminals targets individuals within an organization with social engineering tactics designed to fool them into opening a document from a ZIP file attached to an email. Ransomware…

October 13, 2021 | David Bisson

Why access management needs to evolve beyond passwords

This blog was written by an independent guest blogger. Access management is a key element of any enterprise security program. Using policies defined by IT administrators, access management enforces access rights across the network. It does this by designating which groups of users are allowed access to which applications and identifying which user attributes are required to access each application. …

October 11, 2021 | Julius Charles

Stories from the SOC - Data exfiltration

Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive summary The impact of Data Exfiltration, which is the act of copying or transferring data from a computer or server without authorization, has…

October 7, 2021 | Bindu Sundaresan

Securing the edge with Zero Trust

The proliferation of cloud computing, mobile device use, and the Internet of Things has dissolved traditional network boundaries. Today, the network perimeter has evolved as workloads have moved to the cloud while non-managed, mobile devices have become the norm rather than the exception. The location of applications, users, and their devices are no longer static. Data is no longer confined…

October 6, 2021 | Ziv Hagbi

Introducing the Palo Alto Networks Panorama Advanced AlienApp

Here at AT&T Cybersecurity, we believe cyber protection should include multiple layers and cover as much ground as possible. Having full visibility into threats on the network and being able to automate actions against them not only reduces an organization’s risk but also frees up time for security teams to focus on other high-value security tasks. …

October 4, 2021 | Devin Partida

How to better secure user authentication protocols

This blog was written by an independent guest blogger. In March 2021, cybersecurity researcher Le Xuan Tuyen discovered a security bug in Microsoft Exchange Server. The vulnerability, dubbed ProxyToken, lets attackers bypass the authentication process to access victims’ emails and configure their mailboxes. Normally, Exchange uses two sites, a front and back end, to authenticate users. However, its Delegated Authentication…