December 18, 2020 | J.R. Parsons

‘Twas the night before InfoSec

This blog was written by an independent guest blogger. ‘Twas the night before Christmas, and fresh off the LAN The packets were coming fast out of the span. My wireshark was up with my templates in place, In hopes that I’d find an IP I could trace. The smart home was snug in its /28 With a meager…

December 18, 2020 | Ericka Chickowski

What is next gen antivirus? NGAV explained

This blog was written by a third party author. What is next gen antivirus (NGAV) and how does it work? In contrast to legacy antivirus technology, next generation antivirus (NGAV) advances threat detection on the endpoint by finding all symptoms of malicious behavior across an endpoint system rather than fixating on looking for known malware file attributes. NGAV uses artificial…

Get the latest security news in your inbox.

Subscribe via email

RSS

December 16, 2020 | Bindu Sundaresan

2021 Cybersecurity in healthcare

Breaches and cyberattacks are on the rise in the healthcare industry. The recent acceleration of digital technology and connectivity within Healthcare has led to significant patient care delivery improvements, more effective population health management, and better patient outcomes. With this increased technology and connectivity, however, comes increased exposure to cyberattacks that can impact patient care delivery, safety, and privacy. Cybersecurity…

December 15, 2020 | Theodoros Karasavvas

Why application-layer encryption is essential for securing confidential data

This blog was written by an independent guest blogger. Your business is growing at a steady rate, and you have big plans for the future. Then, your organization gets hit by a cyberattack, causing a massive data breach.  Suddenly, your company’s focus is shifted to sending out letters to angry customers informing them of the incident -…

December 14, 2020 | Mayleen Menez

How secured are touchless solutions?

This blog was written by an independent guest blogger. Image Source: TMC Touchless solutions have risen to the forefront this year because of the latest pandemic that has reshaped the way we work and live. When social distance policies were placed in motion, borders closed, establishments paused operations, and businesses moved online operating amid lockdown. Touchless technologies had to be…

December 10, 2020 | Devin Morrissey

How have digital transactions become safer?

Image Source: Andrea Piacquadio from Pexels This blog was written by an independent guest blogger. With the emergence of cryptocurrencies and massive online marketplaces, keeping your financial information private is a bigger concern than ever. In addition to these new and developing areas, in-person purchasing with debit and credit cards continues to grow. From debit transactions to cryptocurrency, millions of…

December 10, 2020 | Nick Cavalancia

What is Security Orchestration Automation and Response?

This blog was written by a third party author. With the face of cyberthreats in a constant state of flux, it’s nearly impossible for IT and Security teams to manually secure their countless systems, applications, services, and devices, as well as respond to potential and active cyberattacks that manage to flourish despite best efforts.  Because of…

December 9, 2020 | Devin Partida

6 Information security predictions for 2021

This blog was written by an independent guest blogger. Maintaining appropriate information security measures will remain a priority for the foreseeable future, especially with people’s lives becoming increasingly digitized. Here are six trends to expect in the year ahead. 1.  An increase in the Zero-Trust approach Taking a zero-trust approach to data and infrastructure security means that an…

December 8, 2020 | Tawnya Lancaster

Just released! AT&T Cybersecurity Insights™ Report: 5G and the Journey to the Edge

We are certainly in unique times, with COVID driving digital transformation at an unprecedented pace, remote work appearing to be long term, and the specter of new threats looming over security professionals as they strategized how to protect a rapidly changing business and tech landscape.  To use perhaps one too many cliches: it is the best of times, it…

December 7, 2020 | Mark Stone

What is a managed firewall? Benefits, offerings explained

This blog was written by a third party author A firewall can have all the security bells and whistles to keep the bad guys out, but firewalls are only as effective as the people managing them. To get the most out of a firewall, it must be properly managed to ensure it does what it’s supposed to: mitigate…

December 7, 2020 | Karoline Gore

Could electric vehicles present a Cybersecurity risk to the grid?

Credit: Pexels With many countries now participating in the Paris Agreement to address climate change, coupled with the rising popularity of electric vehicles, it is expected that 125 million electric cars will be on the road worldwide by 2030. But these cars, although beneficial to the environment, come with cybersecurity risks. According to experts, security concerns should be addressed before a…

December 3, 2020 | Chuck Brooks

Two cybersecurity hygiene actions to improve your digital life in 2021

This blog was written by an independent guest blogger. It is that time of year again where we start planning resolutions for the coming year. A good start is putting cybersecurity on the top of the list whether you are a business or individual. According to a University of Maryland study, Hackers attack every 39 seconds, on average 2,244 times a day.…