August 6, 2020 | Chris Johnson

How to secure Syslog with USM Anywhere

One of the requests we often get is how to securely forward logs to the USM sensor. To forward logs securely, the one component that is required is an SSL certificate. By default, USM has a self-signed certificate that will allow sending secure logs over port 6514. Some platforms, such as Palo Alto Networks, require publicly signed certificates by default. In…

August 5, 2020 | Mike Banic

Combat mobile phishing attacks targeting Financial Services with AI

Phishing attacks are a common attack vector for financial services organizations. Effective and simple to launch, phishing attacks challenge financial firms to protect their mobile workforce and harden their customer-facing apps. Mobile phishing, in particular, bypasses traditional perimeter defenses such as secure email gateways by targeting users via personal email, SMS and social messaging apps. These attacks typically seek to…

Get the latest
security news
in your inbox.

Subscribe via email

  RSS  

August 4, 2020 | Edwardo Rodriguez

Stories from the SOC: Compromised account detected

Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive Summary The Managed Threat Detection and Response (MTDR) analyst team was notified of multiple logins from different countries. With the shift to a…

August 3, 2020 | Nick Cavalancia

Managed security services explained: what is an MSSP?

This blog was written by a third party author A managed security service provider (MSSP) is an IT service provider that focuses on delivering outsourced cybersecurity monitoring and management services to organizations. Different than a Managed IT Services Provider (MSP) that focuses on managing, maintaining, and servicing an organizations IT environment, MSSPs concern themselves with the continuous state of their…

August 3, 2020 | Bernard Brode

Digital signatures security explained

This blog was written by an independent guest blogger. Digital signatures have been around for decades, but recent events have put them back in the spotlight. They were heralded as the future of cybersecurity as far back as 1999, but in the intervening years came to be somewhat taken for granted by security engineers. Not any longer: the massive move to…

July 31, 2020 | Mark Stone

Secure remote access explained

This blog was written by a third party author As the business world adjusts to the chaotic landscape of today’s economy, securing access from remote devices and endpoints has never been more critical. Equally critical is the requirement for organizations and their employees to practice good security hygiene. With the rising number of endpoints (laptops, servers, tablets, smartphones)…

July 30, 2020 | Roger Thornton

Finding problems that matter

This blog was jointly authored with Ed Amoroso. See their previous blog for more! Towards the end of the 19th century, large cities like New York were facing a vexing problem so devastating that many questioned whether such cities could be sustained at all. People could no longer cross the street without assistance, stumbling was a common problem, disease…

July 20, 2020 | Roger Thornton

In hard times, solve big problems and do your best work

This blog was jointly authored with Ed Amoroso. There’s something eerily familiar about the COVID-19 pandemic for us in the technology world. It’s not the striking similarity to the Hollywood “end-of-the-world” movies we have all seen. No, it’s more about the fear and uncertainty that accompanies an economic downturn—the feeling…

July 16, 2020 | Mayleen Menez

3 Steps to better cybersecurity in touchless business solutions (Part 3 of 3)

This blog was written by an independent guest blogger Image Source   In Part 1 and  Part 2 of this series, we covered the first two steps to better cybersecurity in touchless business solutions, which is to practice extra caution in cashless payment solutions, and to heighten cybersecurity and data protection protocols. We conclude this series by discussing the third step…

July 16, 2020 | Nick Cavalancia

Vulnerability scanning explained

This blog was written by a third party author What is vulnerability scanning? Vulnerability scanning is the process of detecting and classifying potential points of exploitation in network devices, computer systems, and applications. This is done by inspecting the same attack areas used by both internal and external threat actors—such as firewalls, applications, and services that are deployed…

July 15, 2020 | Rich Langston

AlienApps Roundup - Box, Cloudflare, Palo Alto Networks, Salesforce, ServiceNow, Zscaler, Checkpoint

Having a detection and response strategy and tools has long been a leading indicator of a mature, well-funded security organization.  The cost of tools, and expertise required to operate them, has long created an uneven playing field in the security industry. Here at AT&T Cybersecurity, we believe that security, specifically detection and response, is something that should…

July 15, 2020 | Nick Cavalancia

Security as a Service explained

This blog was written by a third party author What is Security as a Service? Security as a Service (often abbreviated as SECaaS) is a means by which organizations ensure the highest levels of threat detection and response in the most cost-efficient manner by utilizing managed security service providers (MSSPs). Originating from the concept of “software as a service…