March 22, 2021 | Devin Partida

Texas power failures highlight dangers of grid attacks

This blog was written by an independent guest blogger. In mid-February, a winter storm left more than 4 million people in Texas without power. These outages lasted days, leading to substantial property damage and even death, and they paint a grim picture for the future. Should a cyberattack successfully infiltrate U.S. power grids, the results could be deadly. The Texas…

March 18, 2021 | Mark Stone

What is a security operations center (SOC)? Explaining the SOC framework

This article was written by an independent guest author. If you’re responsible for stopping cyber threats within your organization, your job is more challenging than ever. The exposure to threats for any organization continues to escalate, and breaches are occurring every day. Consider: The average cost of a data breach is approximately $3.92M On average, it takes 280 days…

March 18, 2021 | Lisa Ashjian

Enterprise-Grade Mobility takes another step forward with new mobile security offers

Companies and organizations of all sizes need mobile technology built for the rigors of business—it’s a must for businesses seeking to stay competitive. Enterprise-grade mobility offers additional business options, features, and services, helping companies perform functions beyond just enabling employees to work remotely. The right mobility solutions can significantly help increase productivity, reduce inefficiencies, improve Quality…

March 18, 2021 | Nick Cavalancia

What is managed detection and response?

This article was written by an independent guest author. The last 12 months have seen massive upticks in the frequency, sophistication, and intensity of cyberattacks. This comes at a time when business operations have changed drastically with shifts to more cloud resource use in order to increase access, availability, productivity, and profits.  The challenge for IT has become how to…

March 17, 2021 | Julia Beyers

Security checklist for using cryptocurrency in online casino transactions

This blog was written by an independent guest blogger. Cryptocurrency (crypto) transactions are solely reliant on the online space. Billions of people have access to online platforms. The autonomy provided by cryptosystems exposes users to more danger as there are no centralized authorities. Thus, expert fraudsters such as hackers may be able to access your transactions via their computer. Therefore,…

March 16, 2021 | Graham Pearson

AT&T Cybersecurity announces 2021 ‘Partners of the Year Awards’ Winners

It is with great pleasure we announce today Softcat as AT&T Cybersecurity’s ‘2021 Global Partner of the Year’. Softcat are among seven other category winners who have achieved exceptional growth in 2020, demonstrating great dedication and collaboration to the AT&T Cybersecurity Partner Program. It is a honor to work with such a resilient and…

March 15, 2021 | Bernard Brode

Is automated vulnerability scanning the best way to secure smart vehicles?

This blog was written by an independent guest blogger. To those who pay attention to such things, it seems like a new vulnerability in smart car systems is found every week. In 2020, the numbers beat all previous years. The inescapable conclusion is that smart cars are now among the favorite targets of hackers and APT (Advanced Persistent Threat) actors. One…

March 15, 2021 | Mark Stone

What is network segmentation? NS best practices, requirements explained

This article was written by an independent guest author. If you follow cybersecurity current events, you may know that the cost and frequency of a data breach continue to skyrocket. Organizations are constantly under attack, and the shift to remote work is only exacerbating the problem. According to IBM’s 2020 Cost of a Data Breach Report, most respondents are…

March 12, 2021 | Sumner Meckel

Stories from the SOC – DNS recon + exfiltration

Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive summary Our Managed Threat Detection and Response team responded to an Alarm indicating that suspicious reconnaissance activity was occurring internally from one of…

March 11, 2021 | Lisa Ashjian

A plea to small businesses: Improve your security maturity

Never have I been so compelled to help educate small businesses on the need for cybersecurity. On Saturday morning, March 6, 2021, I awoke to the Wall Street Journal article describing the Hafnium attack. This attack on Microsoft Exchange Servers was shared publicly on March 2nd with a patch for the issue released on Wednesday, March 3rd. This patch appeared to spark…

March 10, 2021 | Maja Talevska

Deepfake cyberthreats – The next evolution

This blog was written by an independent guest blogger. In 2019, we published an article about deepfakes and the technology behind them. At the time, the potential criminal applications of this technology were limited. Since then, research published in Crime Science has delved into the topic in-depth. The study identified several potential criminal applications for deepfakes. Among these categories, the following…

March 4, 2021 | David Bisson

Tips for minimizing security risks in your microservices

This blog was written by an independent guest blogger. Organizations are increasingly turning to microservices to facilitate their ongoing digital transformations. According to ITProPortal, more than three quarters (77%) of software engineers, systems and technical architects, engineers and decision makers said in a 2020 report that their organizations had adopted microservices. Almost all (92%) of those respondents reported a high level of success. …