July 1, 2020 | Tawnya Lancaster

New report: COVID-19 Threat Intelligence Insight from the Telco Security Alliance

AT&T Cybersecurity along with three members of the Telco Security Alliance (TSA) published a new report today, “COVID-19 Insight from the Telco Security Alliance.” The report provides insight into some of the threat groups (as well as analysis of their campaigns) that are taking advantage of the global pandemic while nations and organizations are vulnerable. TSA…

June 30, 2020 | Ericka Chickowski

Cybersecurity penetration testing explained

This blog was written by a third party author. What is penetration testing? Cybersecurity penetration testing is a method of checking for security weaknesses in software and systems by simulating real-world cyber-attacks. Also known colloquially as 'pen tests,' penetration tests probe beyond the scope of automated vulnerability scans. Pen tests find gaps in protection that can arise when unique combinations…

Get the latest
security news
in your inbox.

Subscribe via email

  RSS  

June 30, 2020 | Geoff Mefford

Ransomware observations

AT&T’s Digital Forensic Incident Response (DFIR) team has been observing cybercriminal organizations steadily increase their ransomware capabilities over the last few years.  We have seen ransomware grow in sophistication and capability at a rapid pace.  So rapidly in fact, that each investigation shows a new tactic or change in the binary program responsible for…

June 29, 2020 | Kim Crawley

WPA security explained: what is Wi-Fi Protected Access?

This blog was written by an independent guest blogger. An overview on Wi-Fi security standards WiFi signals can be put into two different categories, unencrypted and encrypted. Unencrypted WiFi, sometimes known as open WiFi, can be connected to without a password. Anyone with a phone, tablet, PC, video game system, or Internet of Things device within range of the open…

June 25, 2020 | Ericka Chickowski

SD-WAN security explained

This blog was written by a third party author and does not reflect the opinions of AT&T. What is SD-WAN? Software-defined wide area networking (SD-WAN) is a distributed networking approach that provides organizations a sustainable alternative to high latency hub-and-spoke network topologies. How SD-WAN supports network performance Legacy hub-and-spoke networks backhaul branch office traffic to a centralized data…

June 25, 2020 | David Smith

HIPAA in the time of Covid-19

The global cases of Novel Coronavirus are continually ticking upward in most parts of the world, and with every new case come further questions about the patients. Hospitals, governments and even general population is interested to know who the affected people are, what their health history is, which locations they visited, and who they interacted with prior to receiving positive…

June 23, 2020 | Nick Cavalancia

Managed security operations center (SOC) explained

This blog was written by a third party author and does not reflect the opinions of AT&T. What is a managed SOC and how does it work? Managed SOC, also known as SOC as a Service, is a subscription-based offering whereby organizations outsource threat detection and incident response. Based on the concept of turning an internal security operations…

June 23, 2020 | Bernard Brode

What quantum cryptography means for cybersecurity

This blog was written by an independent guest blogger. Just as cybersecurity professionals are getting used to the possible implications of quantum computers, a new front opens in the quantum arms race: using quantum computers for encryption. Though quantum computers remain a largely theoretical threat, some researchers are already working on ways to protect systems against the exponential increase in…

June 22, 2020 | Mayleen Menez

3 Steps to better cybersecurity in touchless business solutions (part 1 of 3)

                                                            Image Source This blog was written by an independent guest blogger. The current pandemic that has upended our lives and wreaked havoc across the world have also humbled countries to…

June 18, 2020 | Ericka Chickowski

Benefits of a security operations center (SOC)

This blog was written by an independent guest blogger. Why having a SOC is paramount A well-run security operations center (SOC) stands as the central nervous system of an effective cybersecurity program. SOCs serve as a hub of organization-wide detection and response capabilities for the people tasked with stopping cyber threats within their organization. While the everyday duties of the…

June 18, 2020 | Danielle Russell

Why right now is the best time to assess your cyber response to COVID-19

The initial response to the COVID-19 pandemic put cybersecurity programs to the test. While organizations quickly rolled out business continuity plans to transition workers from the office to the home and to migrate business online to keep customers and supply chains moving, cybersecurity leaders have worked to help keep the business protected from an onslaught of cyber threats designed to…

June 17, 2020 | Mary Blackowiak

The challenge to security for the new normal

As states begin to lift shelter in place orders and businesses reopen their doors, there is a lot of speculation as to what “the new normal” will look like. And so far, there are still more questions than answers for those of us working from home. When is it safe to return to work? Will we have to…