April 2, 2020 | Bob Covello

Here is why your healthcare provider cannot accept Venmo payments

This blog was written by an independent guest blogger. Are you using Venmo to send and receive payments?  People use Venmo for everything, and in these times when no one wants to handle actual money for fear of spreading infection, Venmo is a brilliant idea.  Of course, the difference between Venmo and other mobile payment applications is that…

April 1, 2020 | Derrick Johnson

The foundation of a Zero Trust architecture

Part 1 of a 3 blog series Organizations have placed a lot of time, effort and capital spend on security initiatives in an effort to prevent security breaches and data loss.  Even the most advanced “next generation” application layer firewalls filtering malicious traffic at the network perimeter has only revealed equal if not greater threats within.  To help…

Get the latest security news in your inbox.

Subscribe via Email

March 31, 2020 | Daniela McVicker

9 Reasons to hire an InfoSec candidate without experience: Focus on skillset vs. experience

This blog was written by an independent guest blogger. $37-$145k jobs for InfoSec specialists without experience. Hiring immediately. This is what a simple internet search has to offer for people looking to get entry-level jobs in Information security (InfoSec), or cybersecurity. It seems like a good deal, considering that the requirements for candidates are much lower compared to many…

March 30, 2020 | Andrew Lukosevic

Stories from the SOC- RIG Exploit Kit

Executive summary Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. AT&T Alien Labs® Open Threat Exchange® (OTX) recently created a pulse for a new threat entitled the RIG…

March 25, 2020 | Karoline Gore

The future of cybersecurity for connected cars 

Connected cars have slowly become mainstream, with more than 700 million of them expected to be operating on roads by 2030. Most new vehicles are leaving production lines with a host of features that require a connection to the online world, including GPS, lane assistance, collision avoidance, and modern infotainment systems. However, while connected vehicles offer abundant opportunities for the…

March 24, 2020 | Tony DeGonia

10 tips for working remotely

We’re all working together to help slow the spread of COVID-19 through new policies and guidelines such as working remotely and socially distancing ourselves from others.  Working remotely can be challenging. I can offer some advice about working remotely, as I have worked both remotely and in a travel capacity for over 10 years, and I really love…

March 23, 2020 | Thomas Jung

Windows Server 2019 OS hardening

This blog was written by an independent guest blogger. Windows Server 2019 ships and installs with an existing level of hardening that is significantly more secure compared to previous Windows Server operating systems. Gone are the bloat of Xbox integration and services and the need for third-party security solutions to fill security gaps. Operating System (OS) hardening provides additional layers of…

March 17, 2020 | Chris Mark

Exploits, vulnerabilities and threat adaptation

Security, whether focused on physical, cyber, operational, or other domains, is an interesting topic that lends itself to considerable debate among practitioners.  There are, however, basic concepts and underpinnings that pervade general security theory. One of the most important, yet often misunderstood concepts are those inextricably entwined concepts of vulnerabilities and exploits.  These basic underpinnings are critical in…

March 16, 2020 | Bindu Sundaresan

Do you have the GRIT to be a cybersecurity consultant?

As I read Angela Duckworth's GRIT, where she explains that the secret to outstanding achievement is not talent but a unique blend of passion and persistence she calls "grit," I was able to relate the need for this power of passion and perseverance to be a successful cybersecurity professional and more importantly a trusted cybersecurity consultant. It takes a…

March 12, 2020 | Devin Morrissey

Malicious Actors and Medical Data: Where Are We Heading?

Data is the hottest commodity in town, particularly on the dark web. But there’s one type of file that hackers are most interested in: your medical data. Whereas a credit card number or Social Security number can net a criminal $1-$15 depending on the data type, medical records can sell for the equivalent of $60 each (in Bitcoin). What…

March 9, 2020 | Karoline Gore

The rising threat of drones to cybersecurity: What you need to know

This blog was written by an independent guest blogger. The Federal Aviation Administration (FAA) reports that there are nearly 1.5 million registered drones in the United States, proving them to be ubiquitous across the country - and there are plenty that are still unregistered, too. From military use to consumers who buy them to start a new hobby, drones…

March 5, 2020 | John Ocampos

How to spot a fake app?

This blog was written by an independent guest blogger. There are billions of mobile phone users in the world, and every day, the number increases as people find convenience in the use of smartphones. As the number of smartphone user increases, technologies, apps, and software are continually created for these devices. However, as people shift their use to mobile devices,…

Watch a Demo ›
Get Price Free Trial