April 9, 2020 | Barmak Meftah

Assess and adapt for resiliency

Admittedly, we are in uncharted territory – what seemed routine a few short weeks ago – commuting to work, going to the gym, or gathering with friends – is now either a daunting task or a non-existent option. This shift has impacted our technology, our workforce, and our business environments almost overnight and with minimal warning. Given the rapid move…

April 8, 2020 | Derrick Johnson

The Zero Trust Authorization Core

This is part 2 of a 3 blog series The Foundation of a Zero Trust Architecture (ZTA) talked about the guiding principles, or tenets of Zero Trust.  One of the tenets mentions how all network flows are to be authenticated before being processed and access is determined by dynamic policy.   A network that is intended to never trust, and…

Get the latest security news in your inbox.

Subscribe via Email

April 7, 2020 | Graham Pearson

AT&T Cybersecurity announces ‘Partners of the Year Awards’ Winners

After weeks of deliberation, we are delighted to announce the winners of the AT&T Cybersecurity 2019 Partners of the Year Awards. Binary Defense has been crowned Global Partner of the Year for their phenomenal growth and commitment in 2019. They are amongst seven other category winners who have achieved outstanding growth in 2019, demonstrating strong collaboration and dedication to the AT…

April 6, 2020 | Maja Talevska

Common focal points of DoS attacks

This blog was written by an independent guest blogger. Is your company at risk of a Denial of Service (DoS) attack? If so, which areas are particularly vulnerable? Think it’s a crazy question? Think again. In 2020, 16 DDoS attacks take place every minute. DoS attacks require fewer resources, and so pose an even greater threat. In this post, we…

April 2, 2020 | Bob Covello

Here is why your healthcare provider cannot accept Venmo payments

This blog was written by an independent guest blogger. Are you using Venmo to send and receive payments?  People use Venmo for everything, and in these times when no one wants to handle actual money for fear of spreading infection, Venmo is a brilliant idea.  Of course, the difference between Venmo and other mobile payment applications is that…

April 1, 2020 | Derrick Johnson

The foundation of a Zero Trust architecture

Part 1 of a 3 blog series Organizations have placed a lot of time, effort and capital spend on security initiatives in an effort to prevent security breaches and data loss.  Even the most advanced “next generation” application layer firewalls filtering malicious traffic at the network perimeter has only revealed equal if not greater threats within.  To help…

March 31, 2020 | Daniela McVicker

9 Reasons to hire an InfoSec candidate without experience: Focus on skillset vs. experience

This blog was written by an independent guest blogger. $37-$145k jobs for InfoSec specialists without experience. Hiring immediately. This is what a simple internet search has to offer for people looking to get entry-level jobs in Information security (InfoSec), or cybersecurity. It seems like a good deal, considering that the requirements for candidates are much lower compared to many…

March 30, 2020 | Andrew Lukosevic

Stories from the SOC- RIG Exploit Kit

Executive summary Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. AT&T Alien Labs® Open Threat Exchange® (OTX) recently created a pulse for a new threat entitled the RIG…

March 25, 2020 | Karoline Gore

The future of cybersecurity for connected cars 

Connected cars have slowly become mainstream, with more than 700 million of them expected to be operating on roads by 2030. Most new vehicles are leaving production lines with a host of features that require a connection to the online world, including GPS, lane assistance, collision avoidance, and modern infotainment systems. However, while connected vehicles offer abundant opportunities for the…

March 24, 2020 | Tony DeGonia

10 tips for working remotely

We’re all working together to help slow the spread of COVID-19 through new policies and guidelines such as working remotely and socially distancing ourselves from others.  Working remotely can be challenging. I can offer some advice about working remotely, as I have worked both remotely and in a travel capacity for over 10 years, and I really love…

March 23, 2020 | Thomas Jung

Windows Server 2019 OS hardening

This blog was written by an independent guest blogger. Windows Server 2019 ships and installs with an existing level of hardening that is significantly more secure compared to previous Windows Server operating systems. Gone are the bloat of Xbox integration and services and the need for third-party security solutions to fill security gaps. Operating System (OS) hardening provides additional layers of…

March 17, 2020 | Chris Mark

Exploits, vulnerabilities and threat adaptation

Security, whether focused on physical, cyber, operational, or other domains, is an interesting topic that lends itself to considerable debate among practitioners.  There are, however, basic concepts and underpinnings that pervade general security theory. One of the most important, yet often misunderstood concepts are those inextricably entwined concepts of vulnerabilities and exploits.  These basic underpinnings are critical in…

Watch a Demo ›
Get Price Free Trial