October 21, 2019 | Kim Crawley

Reviewing best practices for IT asset management in the cloud

It used to be that businesses needing their own large computer networks had to do everything themselves. They had to buy all of their servers, all of their networking appliances. They needed the physical space on premises for all of their datacenters, the HVAC people to keep everything cool, and the massive electricity bills to keep all of that going. …

October 17, 2019 | Mjellma Gonzalez

The risks of public Wi-Fi and how to stay safe

Photo by laura kelly on Unsplash In a bid to entertain their customers, airports, coffee shops, shopping malls - and literally all public places- provide free Wi-Fi. And because the traffic in and around these places is exceedingly high, their Wi-Fi networks aren’t as secure as you’d imagine. For what it is worth,…

Get the latest security news in your inbox.

Subscribe via Email

October 16, 2019 | Devin Morrissey

Are smart homes really safe from hackers?

Image Source: Pexels There are a number of smart devices becoming commonplace in homes around the world, leading us closer and closer to the reality of smart homes, or houses that depend primarily on interconnected smart tech. Heating, lighting, and common appliances like doorbells, alarms, and entertainment devices are now increasingly being designed to operate on the internet of things …

October 15, 2019 | Ashley Graves

Security monitoring for managed cloud Kubernetes

Photo by chuttersnap on Unsplash Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications. It has recently seen rapid adoption across enterprise environments. Many environments rely on managed Kubernetes services such as Google Kubernetes Engine (GKE) and Amazon Elastic Kubernetes Service (EKS) to take advantage of the benefits of both…

WSD protocol used for amplifying DDoS | ThreatTraq

Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers.  I really enjoy them; you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent feature on ThreatTraq.  The video features Jim Clausing, Principal Member of Technical…

October 10, 2019 | Allie Mellen

Love your enemies before you destroy them

Photo by Volkan Olmez on Unsplash “In the moment when I truly understand my enemy, understand him well enough to defeat him, then in that very moment I also love him. I think it’s impossible to really understand somebody, what they want, what they believe, and not love them the way they love themselves.…

October 9, 2019 | Amy Pace

What’s new in OTX

AT&T Alien Labs and the Open Threat Exchange (OTX) development team have been hard at work, continuing our development of the OTX platform. As some of you may have noticed, we’ve added some exciting new features and capabilities this last year to improve understanding within the OTX community of evolving and emerging threats. Malware analysis to…

October 8, 2019 | Karoline Gore

Workplace design tips to help deter hackers

Photo by ROOM on Unsplash 31 percent of companies in the USA have been subjected to cyber attacks and 43 percent of those attacks were aimed at small businesses. When workplaces are designed with cybersecurity in mind, the odds of breaches will decrease. This is good news, because some breaches have the capacity to put companies out of…

Great Cannon DDOS attacks

It looks like the attackers upgraded the code during the attack to check for Cloudflare and target more URLs: pic.twitter.com/2wqP9gj7pR — chris doman (@chrisdoman) September 2, 2019 Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers.  I really enjoy them;…

October 2, 2019 | Jake Lester

How to avoid becoming a victim of cybercrime: 5 tips

Description: Do you want to avoid cybercrime? Online identity theft and fraud, webcam hackers, ransomware cyber-attacks, phishing, and other scams are a threat to all of us. Keep reading to protect your data and privacy and save your files and finances from fraudsters. How to avoid cybercrime   The cyber definition relates to the field of digital technology, and today…

October 1, 2019 | Bindu Sundaresan

What  you need to know about PII security in 2019

As a society we have always relied on personal identifiers, commonly known as personally identifiable information (PII). Defining and protecting PII has recently become much more important as a component of personal privacy now that advances in computing and communications technology, including the internet, have made it easier to collect and process vast amounts of information. The protection of…

GootKit malware bypasses Windows Defender | AT&T ThreatTraq

Photo by Christopher Beddies on Unsplash Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers.  I really enjoy them; you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent…

Watch a Demo ›
Get Price Free Trial