September 14, 2020 | Kate Brew

Preparing for Zero Trust and planning your strategy

I listened in on a neat webcast recently, which was jointly produced by AT&T Cybersecurity and Palo Alto Networks: “Preparing for Zero Trust and Planning your Strategy.” Panelists were John Kindervag, Field CTO, Palo Alto Networks, Steve Sekiguchi, Director, AT&T Chief Security Office, Bindu Sundaresan, Director, AT&T Cybersecurity and Tawnya Lancaster, Lead…

September 10, 2020 | Mark Stone

Firewalls explained: the different firewall types and technologies

This blog was written by a third party author. Finding the right network security tools to secure your sensitive data can be a significant challenge for any organization. Choosing a firewall may seem like a simple task, but companies can get overwhelmed by the different firewall types and options. Making the distinction between a firewall and other security solutions can…

Get the latest
security news
in your inbox.

Subscribe via email

RSS

September 9, 2020 | Nahla Davies

What you need to know about securing your APAC business and the recent data law changes

Data breaches are growing in frequency and intensity amidst the recent Coronavirus pandemic, having increased by nearly 273% in the first quarter compared to the same time frame last year. In fact, 2020 may very well be remembered as the year when cybersecurity became a business problem rather than a technology issue. The driving factor here is the recent shift in workforce…

September 9, 2020 | Mark Stone

What is Incident Response?

This blog was written by a third party author. As new types of security incidents are discovered, it is absolutely critical for an organization to respond quickly and effectively when an attack occurs. When both personal and business data are at risk of being compromised, the ability to detect and respond to advanced threats before they impact your business is…

September 8, 2020 | Kim Crawley

6 Crucial password security tips for everyone

This blog was written by an independent guest blogger. These days, everyone has passwords. Lots and lots of passwords! When I think of how many user accounts with passwords that I have, I probably have dozens. A few for social media platforms like Twitter and LinkedIn, a few for my favorite media streaming services, one for Nintendo Switch and another…

September 2, 2020 | Bernard Brode

How Covid-19 has increased vulnerabilities in Industrial Control Systems

This blog was written by an independent guest blogger. By now, most are aware that the Covid-19 pandemic has led to a spike in cyberattacks. This sharp increase in malicious activity related to COVID has taken the typical form of adversaries seeking to benefit financially, gain unauthorized access to networks for immediate and long-term strategic benefit, and spread misinformation with…

September 2, 2020 | Nick Cavalancia

Red Team testing explained: what is Red Teaming?

This blog was written by a third party author. In the world of cybersecurity preparedness, there are a variety of strategies organizations large and small can take to help protect their networks and data from cyber-attacks. One such strategy involves an organization testing its own environment for security vulnerabilities. But because security weaknesses come in different forms, it’s…

September 1, 2020 | Kim Crawley

PCI DSS logging requirements explained

This blog was written by an independent guest blogger. As a consumer, I feel more confident about using my credit card online and in brick-and-mortar stores when I know retailers are being careful about PCI DSS compliance. Breached financial credentials can wreak havoc not only on the lives of consumers, but also on the well-being of merchant businesses. I think…

September 1, 2020 | Nick Cavalancia

What is a cloud SIEM?

This blog was written by a third party author. Security information and event management (SIEM) solutions offer businesses the ability to collect, store, and analyze security information from across their organization and alert IT admins/security teams to potential attacks. In today’s complex digital environments, SIEMs allow IT teams to more effectively detect and respond to a…

August 31, 2020 | Devin Morrissey

Aviation cybersecurity: Hurdles of staying secure on the ground and at 36,000 feet

This blog was written by an independent guest blogger. Image Source: Pexels Digitization has made its way into every industry. With this shift comes many benefits as well as the risk of a cyber attack. This is especially true in aviation. No matter how securely companies can build networks to ward off cyber attacks, the risk is never absent. With…

August 26, 2020 | Bob Covello

Amazon scammers are becoming oddly specific

This blog was written by an independent guest blogger. A friend contacted me the other day about a scam call purporting to come from Amazon’s customer support department.  She wasn’t home at the time, so the scammer left a message stating that a charge of $749 appeared on her account.  Of course, she didn&rsquo…

August 26, 2020 | Mark Stone

IoT security explained

This blog was written by a third party author. The Internet of Things (IoT) is a term used to describe a system of interconnected computing devices that use the internet to send and receive data without requiring human to computer or human to human coordination. The world of IoT encompasses a wide variety of technologies, vendors, and connectivity methods. While…