August 24, 2020 | Theresa Lanowitz

2020: the year cybersecurity went from a technology problem to a business issue

In March when businesses enforced a work-from-home policy because of the pandemic, many probably thought the move would last a few weeks or so. Well, here we are, in the heat of the summer or depth of winter, depending on your hemisphere, and some businesses are still working remotely, while others have made the return to the office. Regardless of…

August 20, 2020 | Mary Blackowiak

Work from home cybersecurity explained: should your business have a WFH policy?

Global organizations are sharpening their strategies that enable their employees to work from virtually any location at any time. But working in different types of remote settings brings with it the potential for significant cybersecurity threats that must be anticipated, defended against, and quickly remediated. Working outside the traditional office setting has accelerated during the past decade. Organizations have stepped…

Get the latest
security news
in your inbox.

Subscribe via email

  RSS  

August 20, 2020 | Maricar Morga

Security policies for your remote workforce

This blog was written by an independent guest blogger. Current events are driving dramatic changes to many business industries around the planet. One of the most notable shifts is how the office-based framework for employees transformed to a remote workforce environment. Remote working has now become the norm for many enterprises and organizations worldwide. While the remote working environment is…

August 19, 2020 | Nick Cavalancia

User and Entity Behavior Analytics (UEBA) explained

This blog was written by a third party author What is UEBA? User and Entity Behavior Analytics (UEBA) is an area of cybersecurity that focuses on analyzing activity – specifically user behavior, device usage, and security events ­– within your network environment to help companies detect potential insider threats and compromised accounts. While the concept has been around for…

August 19, 2020 | Mark Stone

Zero Trust Network Access (ZTNA) explained

This blog was written by a third party author In today’s ever-changing cybersecurity landscape, Zero Trust is here to stay. Before the concept of Zero Trust was well known, organizations followed the belief that anything within the network is trusted, and anything outside of it is untrusted. Zero trust is built on the idea that all traffic, whether…

August 19, 2020 | David Balaban

How to check the effectiveness of phishing

This blog was written by an independent guest blogger. You can install the latest generation of security software to protect against evil hackers, but what is the use of it if your employees continue to follow phishing links? Several security companies conduct social and technical research of real-life phishing attacks aimed at different businesses and are impressed with the scale…

August 18, 2020 | Devin Morrissey

Security concerns and solutions regarding blockchain use in healthcare

This blog was written by an independent guest blogger. Image Source: Pexels The healthcare industry is transforming with the integration of ground-breaking technologies capable of storing patient records electronically. The shift to the digitization of systems makes a variety of healthcare solutions possible that never could have been imagined — but it also puts healthcare data at risk to hackers…

August 17, 2020 | Clint Harris

Cloud security

Introduction / Overview There’s no doubt that the adoption of public cloud deployments has accelerated for most organizations recently. In fact, according to metrics released by Oracle recently, nearly half (49%) of all respondents to the Oracle and KPMG Cloud Threat Report expect to store most of their data in a public cloud by the end of 2020. Effectively managing…

August 14, 2020 | Kate Brew

The Forrester Wave™: Global Managed Security Services Providers, Q3 2020

AT&T Cybersecurity is ranked among the top managed security service providers in The Forrester WAVE™: Global Managed Security Services Providers, Q3 2020. Among the findings, Forrester recommends customers look for MSSPs that can offer remediation support across hybrid environments and help create efficiencies within your environment. AT&T Cybersecurity managed security services offers: Visibility and coverage across…

August 13, 2020 | Rich Langston

AlienApps and plug-ins combined into one framework

The heart of any detection and response solution is the ability to collect events from the environment, perform corrective response actions, and integrate with customer workflows. Today, we’re proud to announce the launch of a complete redesign of the user interface for these third party integrations.  We’ve updated our design to make it easier for…

August 12, 2020 | Mark Stone

What is endpoint protection? Endpoint security explained

This blog was written by a third party author. 5G is here and changing the way business is done. With this comes an increase of devices to take advantage of low latency and high bandwidth that will allow businesses to truly transform. Because of those devices, the attack surface is also rapidly expanding and will increase opportunities for bad actors.…

August 12, 2020 | Falan Memmott

Being onsite for an assessment is better, but a lot of it is possible remotely

The way we shop for groceries has changed because of the unusual circumstances the world is in today. Instead of spending as much time physically in the store selecting our own items, we now have the option to order online and arrange for a time to pick them up, or better yet, have them delivered. Of course, there may be…