May 15, 2019 | Karoline Gore

Critical Cyber Security features that your business needs to survive

Recent statistics show that 60% of businesses are forced to suspend operations after a cyber-attack are never able to reopen for business. This is largely due to revenue lost due to downtime as well as damage to the company’s reputation. The good news is that most of these threats can be mitigated with reliable cybersecurity. When…

May 14, 2019 | Kate Brew

Confidence: the perception and reality of cybersecurity threats

At RSA 2019, we conducted a survey that netted 733 respondents along with interviews between Javvad Malik, former security advocate at AT&T Cybersecurity, and security experts. The full results are in his comprehensive and informative research report. Following are a few highlights: Internal threats Phishing is the clear “winner” here. At 29%, nearly a third cited phishing as the…

Get the latest security news in your inbox.

Subscribe via Email

May 8, 2019 | Kelley Bryant

The art of pushing left in application security

Today, software is being developed at a breakneck speed. Agile development and the aggressive adoption of DevOps is leading to an abundance of functionality and feature sets, or pieces of code pushed out to consumers at a record pace.  These one-click opportunities may indeed get us what we want, however, the game remains the same. The Achilles Heel is…

May 7, 2019 | Javvad Malik

What does the CISO say? A Tweetchat roundup

Note from the editor: Javvad has left AT&T Cybersecurity, but on his last day he penned a final blog, recapping the awesome tweet chat we had with all star CISO's. Here is Javvad's heroic working-the-last-day blog: On 18th April 2019, @ATTCyber gathered a panel of CISOs (and recovering CISOs) for a tweetchat to discuss some of the…

May 6, 2019 | Bob Covello

Don’t focus 100% on security

In recent months, I have met many people who are interested in working in Cybersecurity.  This is wonderful, especially given the amount of available employment opportunities in this field. Like any ambitious person, the people who approach me to ask about getting into the field want to fully immerse themselves in “all things security”.  This is…

April 30, 2019 | Katia Dean

What everybody ought to know about mentoring in InfoSec

It seems like everyone wants to get into the field of cyber security. Regarding this, having a mentor is important for your cyber career. A mentor is known to be knowledgeable in the field, will guide you along your path providing direction from what they have learned and motivate you throughout your career. When I set out on this path,…

April 29, 2019 | Kim Crawley

How to create a security culture in your company in 2019

Cybersecurity isn’t just about the computer hardware, software, and networking technicalities that it pertains to. It is also about how human beings behave with computer technology–and what sort of cyber risks that behavior can create. Culture influences behavior, and the security culture of your company can have an immense effect on your cybersecurity. I’ll explain why. What…

April 26, 2019 | Javvad Malik

Things I hearted this week 26th April 2019

Hello and welcome to a very special edition of things I hearted this week as this may be the last time you’ll read this column here on the AlienVault (AT&T Cybersecurity) blog. And I’ve probably already said too much. Onwards with the things I hearted. How to help dissidents with technology? “Lift all…

April 25, 2019 | Julia Kisielius

AT&T Cybersecurity develops new AlienApp for Box for highly secure content management in the cloud

Today, I’m excited to share that we have released AlienApp for Box, a new security integration between AT&T Cybersecurity and Box, a leader in cloud content management. This new feature within USM Anywhere takes advantage of Box's granular logging capabilities and powerful APIs to add an additional layer of security for Box Enterprise customers that…

April 24, 2019 | Jennia Hizver

Making your MFA secure: tips from a security architect

Many security breaches take place when attackers gain access to Internet-facing applications by using compromised credentials. As an added layer of security against leaked credentials, organizations have been implementing multi-factor authentication (MFA) mechanisms to verify the identity of users connecting to critical online assets. One of many multi-step authentication methods is phone call back. The authentication process starts with a…

April 23, 2019 | Javvad Malik

Security through transparency

There are many things within Information security that pundits have been claiming are dead, or should be killed by fire - passwords are usually found at the centre of such debates. But this isn’t a post about passwords, it’s a post about honesty, and trust. But let’s first take a look at the other…

April 18, 2019 | Karoline Gore

Ethical hacking as a post-graduation opportunity

The world of cybersecurity is an ever-changing one of constant preemptive preparation, where companies are forced to hunt for any kinks in their defenses to ensure that they’re as protected as possible. Working as an ethical hacker allows information technology graduates to come into the job market and aid companies in finding those kinks so that…

Watch a Demo ›
Get Price Free Trial