September 25, 2019 | Alissa Knight

Undivided we fall: decoupling network segmentation from micro-segmentation in the software defined perimeter

Introduction As of today, no laws or regulations, even the latest version of PCI-DSS, HIPAA, and HITECH, do not make network segmentation or micro-segmentation compulsory to comply with the rule. By making network segmentation discretionary -- even when transmitting, processing, or storing regulated data, the number of breaches will continue to rise as companies err on the side of…

September 24, 2019 | Devin Morrissey

Medical apps & privacy: where are we?

Image Source: Unsplash Finding a new health-related app that tracks symptoms, increases self-care behaviors, or offers disease-specific education can be exciting for consumers. However, many apps share information with a host of other companies for marketing purposes. Often, these companies have nothing to do with healthcare and are not even  businesses the individual uses. This knowledge can be scary…

Get the latest security news in your inbox.

Subscribe via Email

September 23, 2019 | Kim Crawley

How to justify your cybersecurity budget in 2019

It’s less expensive to prevent cyber attacks than it is to repair the damage when they happen. Companies and institutions across industries lose money from cyber attacks all the time.  There are the more obvious ways like piracy, data breaches, and litigation. There are also ways that accountants can’t quite put a dollar figure on,…

September 18, 2019 | Sam Bocetta

Does your government take cybersecurity seriously enough?

Photo by Katie Moum on Unsplash Cybercrime is global, but the response isn’t. Governments in the west are slowly waking up to the importance of cybersecurity, and are (equally slowly) helping businesses to safeguard data and home users to protect their homes from cyberattack. Look outside Europe and the US, though, and the picture is…

There’s no such thing as an entry-level job in cybersecurity

Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers.  I really enjoy them; you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent feature on ThreatTraq.  The video features Jonathan Gonzalez,…

September 16, 2019 | Mike Klepper

Hacker prevention: tips to reduce your attack surface

These days it seems that every time you open your favorite news source there is another data breach related headline.  Victimized companies of all sizes, cities, counties, and even government agencies have all been the subject of the “headline of shame” over the past several months or years.  With all this publicity and the increasing awareness…

September 13, 2019 | Skylar Talley

Defining the “R” in Managed Detection and Response (MDR)

This spring, as the product and security operations teams at AT&T Cybersecurity prepared for the launch of our Managed Threat Detection and Response service, it became obvious to us that the market has many different understandings of what “response” could (and should) mean when evaluating an MDR solution. Customers typically want to know: What incident response…

September 11, 2019 | Jason Nelson

Practicing safe charging  

This past June, I attended the 2019 Bitcoin Conference in San Francisco, CA. With the various discussions on Bitcoin, Cryptocurrency, and with the chance to hang out with my favorite Crypto personalities, it was easy to lose myself in all the festivities. While taking a break, I found a seat and decided to charge my iPhone.  The station by where…

September 10, 2019 | Tony Tomov

Should small business owners concern themselves with business espionage?

As technological developments have helped turn the world into a global village, they have also made it easier to steal, extract, and communicate confidential information – leading to an increased frequency of corporate espionage. Take Apple for example; despite deploying leading security measures and monitoring activities, the tech giant has had two espionage attempts in one year, foiled just as…

September 9, 2019 | Amy Fletcher

Category 1 cyber threat for UK businesses

Julia Solonina Britain should be prepared for a Category 1 cyber security emergency, according to the National Cyber Security Centre (NCSC). This means that national security, the economy, and even the nation’s lives will be at risk. However, despite this harsh warning, UK businesses still aren’t taking proactive and potentially preventative action to stop these attacks from…

September 5, 2019 | Rich Langston

Ransomware experiences and why IT security professionals have a lot on their minds

Every year we survey visitors to our booth at Black Hat about trending topics.  This year, we asked about ransomware and the ever-increasing complexity of our cybersecurity environment.  The results are very interesting - things may be getting much better, or we may all be collectively in denial.  Let's break it down. We surveyed 145 IT security…

August 22, 2019 | Kim Crawley

How to prevent crime on the Deep Web and Dark Web

Sir Tim Berners-Lee invented the World Wide Web in 1989, and then it became available to the general public by 1991. The web is an internet service that was designed to help scientists and academics exchange information more effectively. But by the late 1990s, the web helped to make the internet popular and accessible to ordinary people all over the world. Over…

Watch a Demo ›
Get Price Free Trial