May 22, 2019 | Bob Covello

If you confuse them, you lose them.

I was watching a wonderful webcast by Marie Forleo.  It was part of her “Copy Cure” course, and if you are unfamiliar with Marie and her work, take the time to explore some of her wisdom.  Her webcasts are gems, particularly if you work in the consulting space. During the webcast she mentioned a phrase that…

May 21, 2019 | Devin Morrissey

The future of stock market analysis

Image Source: Pexels Stock sales and trading play a huge role in the U.S. and global economy. Stock exchanges provide the backbone to the economic infrastructure of our nation, as they help companies to expand when they’re ready by offering the general public a chance to invest in company stock. However, investing in the stock market can…

Get the latest security news in your inbox.

Subscribe via Email

May 15, 2019 | Karoline Gore

Critical Cyber Security features that your business needs to survive

Recent statistics show that 60% of businesses are forced to suspend operations after a cyber-attack are never able to reopen for business. This is largely due to revenue lost due to downtime as well as damage to the company’s reputation. The good news is that most of these threats can be mitigated with reliable cybersecurity. When…

May 14, 2019 | Kate Brew

Confidence: the perception and reality of cybersecurity threats

At RSA 2019, we conducted a survey that netted 733 respondents along with interviews between Javvad Malik, former security advocate at AT&T Cybersecurity, and security experts. The full results are in his comprehensive and informative research report. Following are a few highlights: Internal threats Phishing is the clear “winner” here. At 29%, nearly a third cited phishing as the…

May 8, 2019 | Kelley Bryant

The art of pushing left in application security

Today, software is being developed at a breakneck speed. Agile development and the aggressive adoption of DevOps is leading to an abundance of functionality and feature sets, or pieces of code pushed out to consumers at a record pace.  These one-click opportunities may indeed get us what we want, however, the game remains the same. The Achilles Heel is…

May 7, 2019 | Javvad Malik

What does the CISO say? A Tweetchat roundup

Note from the editor: Javvad has left AT&T Cybersecurity, but on his last day he penned a final blog, recapping the awesome tweet chat we had with all star CISO's. Here is Javvad's heroic working-the-last-day blog: On 18th April 2019, @ATTCyber gathered a panel of CISOs (and recovering CISOs) for a tweetchat to discuss some of the…

May 6, 2019 | Bob Covello

Don’t focus 100% on security

In recent months, I have met many people who are interested in working in Cybersecurity.  This is wonderful, especially given the amount of available employment opportunities in this field. Like any ambitious person, the people who approach me to ask about getting into the field want to fully immerse themselves in “all things security”.  This is…

April 30, 2019 | Katia Dean

What everybody ought to know about mentoring in InfoSec

It seems like everyone wants to get into the field of cyber security. Regarding this, having a mentor is important for your cyber career. A mentor is known to be knowledgeable in the field, will guide you along your path providing direction from what they have learned and motivate you throughout your career. When I set out on this path,…

April 29, 2019 | Kim Crawley

How to create a security culture in your company in 2019

Cybersecurity isn’t just about the computer hardware, software, and networking technicalities that it pertains to. It is also about how human beings behave with computer technology–and what sort of cyber risks that behavior can create. Culture influences behavior, and the security culture of your company can have an immense effect on your cybersecurity. I’ll explain why. What…

April 26, 2019 | Javvad Malik

Things I hearted this week 26th April 2019

Hello and welcome to a very special edition of things I hearted this week as this may be the last time you’ll read this column here on the AlienVault (AT&T Cybersecurity) blog. And I’ve probably already said too much. Onwards with the things I hearted. How to help dissidents with technology? “Lift all…

April 25, 2019 | Julia Kisielius

AT&T Cybersecurity develops new AlienApp for Box for highly secure content management in the cloud

Today, I’m excited to share that we have released AlienApp for Box, a new security integration between AT&T Cybersecurity and Box, a leader in cloud content management. This new feature within USM Anywhere takes advantage of Box's granular logging capabilities and powerful APIs to add an additional layer of security for Box Enterprise customers that…

April 24, 2019 | Jennia Hizver

Making your MFA secure: tips from a security architect

Many security breaches take place when attackers gain access to Internet-facing applications by using compromised credentials. As an added layer of security against leaked credentials, organizations have been implementing multi-factor authentication (MFA) mechanisms to verify the identity of users connecting to critical online assets. One of many multi-step authentication methods is phone call back. The authentication process starts with a…

Watch a Demo ›
Get Price Free Trial