March 4, 2021 | David Bisson

Tips for minimizing security risks in your microservices

This blog was written by an independent guest blogger. Organizations are increasingly turning to microservices to facilitate their ongoing digital transformations. According to ITProPortal, more than three quarters (77%) of software engineers, systems and technical architects, engineers and decision makers said in a 2020 report that their organizations had adopted microservices. Almost all (92%) of those respondents reported a high level of success. …

March 3, 2021 | Maria Mladenovska

Extended threat detection and response (XDR): Filling out cybersecurity gaps

This blog was written by an independent guest blogger.  Image source Business technology generally advances on a rapid basis, however, so do the cyberthreats that can endanger your security. According to BusinessWire, more than half of enterprises believe that their security cannot keep up, and according to IBM News Room, more than half of organizations with cybersecurity incident response…

Get the latest security news in your inbox.

Subscribe via email

RSS

March 2, 2021 | Sumner Meckel

Stories from the SOC – Beaconing Activity

Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive Summary Beaconing analysis is one of the most effective methods for threat hunting on your network. In the world of malware, beaconing is…

March 1, 2021 | Devin Partida

5 Cybersecurity concerns surrounding the COVID vaccine

This blog was written by an independent guest blogger. COVID-19 vaccines are starting to roll out after a year of grappling with the pandemic.  While this certainly inspires hope for the future, there are still risks on the road ahead. As distribution ramps up, vaccine-related cybersecurity concerns are also rising. Cybercrime has been a prominent side effect of the…

February 24, 2021 | Chris Mark

Quantifying CyberRisk- Solving the riddle

In the late 1990’s and early 2000’s there was a concept that was bandied about that was coined “Return on Security Investment” or ROSI.  Borrowing from the common business term Return on Investment (ROI) where a return on a particular investment (capital investment, personnel, training etc.) could be quantified, the cybersecurity industry attempted to quantify…

February 23, 2021 | Kate Brew

Cybersecurity and online gaming: Don’t be a victim

Theresa Lanowitz collaborated on this blog. Introduction The proliferation of technology and internet connectivity has made it possible for people to seek out most things online, and gaming and gambling are not exceptions. In addition to online video games, social media, music, and video streaming, there are also online casinos and gambling for real money. Well, for gambling in the…

February 17, 2021 | Mark Stone

What is an incident response plan? Reviewing common IR templates, methodologies

This article was written by an independent guest author. In today’s threat landscape, it’s no longer if an incident will happen, it’s when. Defending your organization and having a plan for what to do if an incident occurs is more critical than ever. And frankly, the benefits of having an incident response plan are…

February 15, 2021 | Theodoros Karasavvas

CISOs report that ransomware is now the biggest cybersecurity concern in 2021

This blog was written by an independent guest blogger. As the number of remote working arrangements rose substantially in the last year, cybercriminals were quick to take advantage of these new opportunities. Spam and phishing emails increased in number even more rapidly than telecommuting, and company cybersecurity officers found themselves struggling to keep up.  Phishing emails often came with…

February 11, 2021 | David Bisson

The Kubernetes API Server: Exploring its security impact and how to lock it down

This blog was written by an independent guest blogger. Organizations are increasingly turning to Kubernetes to manage their containers. As reported by Container Journal, 48% of respondents to a 2020 survey said that their organizations were using the platform. That’s up from 27% two years prior. These organizations could be turning to Kubernetes for the many benefits it affords them. As…

February 10, 2021 | Sam Meenasian

Budgeting in cybersecurity - Can businesses afford it?

This blog was written by an independent guest blogger. Creating an annual budget is challenging because business owners must consider all expenses in the coming year. Apart from ensuring that everyone is paid, and taxes are taken care of, cybersecurity should be one of the most important factors to consider. Even though there are many methods businesses can use to…

February 9, 2021 | Nahla Davies

Zero Trust policies - Not just for humans, but for machines and applications too

This blog was written by an independent guest blogger. Hackers are continually finding more and more pathways into an organization’s internal environment. Not only is access widely available, it can also be alarmingly simple. Rather than having to actively hack systems, hackers often just log in using easily-obtained or compromised user identities and credentials.  To avert these…

February 9, 2021 | Mark Stone

What is cybersecurity testing? Reviewing testing tools, methodologies for proactive cyber readiness

This article was written by an independent guest author. What does cybersecurity testing really mean? Your organization may boast all the best cybersecurity hardware, software, services, policies, procedures and even culture. If this is the case, you’re way ahead of the curve. But no matter how confident you are about your overall cybersecurity posture, how can you really…