June 11, 2020 | Kim Crawley

Bluetooth security risks explained

This blog was written by an independent guest blogger. What would we do without Bluetooth these days? Our earbuds and headphones would have to use annoying wires. We would have one less way to transfer files between your laptop and your phone. And how would you connect your phone to your car? But as a wireless data transfer standard, of…

June 10, 2020 | Nahla Davies

Are airports and airlines prepared for cyber threats post COVID-19?

This blog was written by an independent guest blogger. The COVID-19 pandemic has unveiled numerous vulnerabilities and shortcomings in the airline industry. What’s worse for aviation in particular over other industries is how airports have essentially served as the portal for the virus traveling from one country to another across the globe. As a result of severe travel…

Get the latest
security news
in your inbox.

Subscribe via email

  RSS  

June 9, 2020 | Daniel Kobialka

What is a SIEM and what are the benefits for business?

Security information and event management (SIEM) technology is transforming the way IT teams identify cyber threats, collect and analyze threat data and respond to security incidents. But what does that all mean? To better understand SIEM, let's take a look at SIEM technology, how it works and its benefits. What is a SIEM? A security information event manager (SIEM)…

June 9, 2020 | Carisa Brockman

Fireside chat: cybersecurity thought leadership

In these trying times, the issues in cybersecurity are changing. Some emerging key themes we are seeing as consultants are: A suddenly remote workforce An acceleration in digital and cloud transformation A surge in cybercrime related to COVID-19 How does having a robust security framework with well-defined policies enable companies to react quickly when a major disruption occurs?  It…

June 8, 2020 | Jeff LaCroix

Stories from the SOC - detecting network anomalies with OTX

This blog was co-written by Leo Garcia, Sr. Specialist - Cybersecurity.. Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive Summary This Investigation was initiated on the basis of several Network Anomaly…

June 4, 2020 | Jason Nelson

 Keeping kids safe online

This blog was written by an independent guest blogger. As we all know by now, the Internet is an excellent tool for business, learning, and entertainment. Not only is it a tool, but it's also an essential part of our lives. Information, connections, and opportunities at the touch or swipe of a finger. As more and more people…

June 3, 2020 | Andrew Lukosevic

Stories from the SOC- SSH Brute Force Authentication Attempt

Ervin McBride IV – TDP Engineer II contributed to this article. Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive Summary The Managed Threat Detection and Response (MTDR) analyst team received and…

June 2, 2020 | Tawnya Lancaster

Threat hunting explained: what is cyber threat hunting?

What is threat hunting? The process of threat hunting involves proactively searching for malware or attackers that are hiding within a network. Rather than simply relying on security solutions or services to detect threats, threat hunting is a predictive element to a layered security strategy, empowering organizations to go on the offensive looking for threats. Threat hunting is typically carried…

June 1, 2020 | Karoline Gore

Top Cybersecurity threats For seniors

This blog was written by an independent guest blogger. There are around 39.5 million people in the U.S. aged over 65, and a high percentage of them, particularly women (nearly 40%) live alone. Living alone makes seniors more reliant on technology, which can be a savior (think Zoom, Skype and other communication-centered technology) as well as a threat (from…

May 31, 2020 | Kim Crawley

Explain how a Virtual Private Network (VPN) works

This blog was written by an independent guest blogger. Global health events in 2020 have accelerated a trend. Office workers are working from home more frequently. This is great for many reasons. Companies can save money on office space. People are often more productive in the environment they’re most comfortable in, their homes. Rush hour can be mitigated with…

May 27, 2020 | Katelyn Ilkani

How malware mimics the spread of COVID-19

It’s a weird time to be alive. Millions of people globally are living under government lockdowns, as we collectively endure the COVID-19 pandemic. COVID-19 has brought to light some fundamental truths about humanity, including our deep-seated need for social interactions. It has also highlighted how reliant we are on critical infrastructure like our healthcare systems and internet connections,…

May 26, 2020 | Josh Gomez

Stories from the SOC - System compromise with lateral movement

Executive Summary Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Malicious network traffic from foreign IPs was observed trying to establish communication to a compromised internal system. The internal system was then…