September 29, 2020 | Nick Cavalancia

Zero Trust Architecture explained

This blog was written by a third party author. With the increase in frequency, sophistication, and cost of cyberattacks, the global focus on cybersecurity is at an all-time high. However, the goalposts for those tasked with protecting businesses have shifted. Hackers have a growing number of ways they can compromise a business and are frequently looking to move laterally within…

September 28, 2020 | Edwardo Rodriguez

Stories from the SOC – Cloud and On-site Protection

This blog was jointly authored by Josue Gomez Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive Summary One of the benefits of having your managed detection and response (MDR) service managed…

Get the latest security news in your inbox.

Subscribe via email

RSS

September 24, 2020 | Ericka Chickowski

BYOD security explained: what is a BYOD policy?

This blog was written by a third party author What is bring your own device (BYOD)? Bring your own device (BYOD) describes the practice of using a personal device such as a smartphone or tablet to conduct business on an organization's network or with its data. Organizations constantly walk a tightrope with their BYOD policies to balance employee productivity…

September 23, 2020 | Tawnya Lancaster

IDC MarketScape Names AT&T a Leader in Worldwide Managed Security Services

IDC recently published the IDC MarketScape: Worldwide Managed Security Services 2020 Vendor Assessment, in which primary author Martha Vazquez and team studied 17 organizations that offer MSS globally. The report provides a comprehensive look at MSSP vendors, including AT&T, and how managed security services are evolving to meet the needs of customers today. This is especially relevant as security teams…

September 23, 2020 | Mark Stone

What is mobile device management? MDM explained

This blog was written by a third party author. Not too long ago, the desktop computer was the primary computing device for enterprise employees. With the rise of mobile endpoints like smartphones, laptops and tablets, employees are connecting to corporate networks from a wide variety of places and devices. Today, especially with the popularity of the WFH (work from home)…

September 22, 2020 | Zachary Curley

Data privacy and data governance fundamentals of the NIST Privacy Framework

As of January 16, the National Institute for Standards and Technology (NIST) published the first version of their privacy framework. For those of you familiar with NIST frameworks you will already be accustomed with the way NIST presents control categories, controls, sub controls, et cetera. This framework includes the following categories: Identify Govern Control Communicate Protect Some of these controls have…

September 22, 2020 | David Bisson

Why misconfigurations are such an issue in your containers and Kubernetes

This blog was written by an independent guest author. Organizations are increasingly incorporating containers and Kubernetes into their IT infrastructure. As reported by ZDNet, Flexera’s “2020 State of the Cloud Report” found that about two-thirds (65%) of organizations were using Docker and that another 14% intended to begin using it at some point. Slightly fewer organizations (58%) were using Kubernetes…

September 22, 2020 | Nick Cavalancia

Security awareness training explained

This blog was written by a third party author. Cyberattacks are an almost daily occurrence for many IT and security professionals, and there are a host of different security solutions in the marketplace today that look to help companies detect and prevent those attacks. However, despite all the technology organizations have in place, their users remain their weakest link. Phishing…

September 21, 2020 | Karoline Gore

Cyber safety tips for virtual events

This blog was written by an independent guest blogger. Since the start of the Covid-19 pandemic, the use of video chat software like Zoom has increased to 300 million meetings held per day. Unfortunately, hackers have taken to crashing private meetings and flooding them with objectionable content — a phenomenon known as Zoombombing. If you’re planning a…

September 17, 2020 | Ericka Chickowski

What is DDoS mitigation and how does it work?

This blog was written by a third party author. Distributed denial of service (DDoS) attacks are a favorite method for attackers to disrupt or debilitate firewalls, online services, and websites by overwhelming systems with malicious traffic or transaction requests. DDoS attackers accomplish this by coordinating an army of compromised machines, or 'bots', into a network of devices they control from…

September 16, 2020 | Nick Cavalancia

Dark Web monitoring and scanning explained

This blog was written by a third party author. Shady deals often occur in darkness – criminal activities require secrecy to cloak their illicit nature. Today, you can find those dark places on the fringes of the internet, known as the Dark Web. More often than not, this is the place where cybercriminals go to monetize the data they&rsquo…

September 15, 2020 | Michelle Moore

Inside the Infographic: “Cybersecurity by the Numbers”

This blog was written by an independent guest blogger. The ongoing cybercrime epidemic has triggered a cybersecurity calls to arms, as organizations around the world are looking for skilled workers to help fight potentially expensive problems. One of the cool features of the University of San Diego’s comprehensive new Cybersecurity Jobs Report is a shareable graphic…