July 16, 2019 | Kate Brew

High Risk Vulnerabilities in Docker Containers | AT&T ThreatTraq

Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers.  I really enjoy them; you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent feature on ThreatTraq.  The video features Jonathan Gonzalez, Principal Technical Security, John…

July 15, 2019 | Derrick Johnson

Cloud Security and Risk Mitigation

The cloud certainly offers its advantages, yet as with any large-scale deployment, the cloud can offer some unforeseen challenges.  The concept of the cloud just being “someone else’s data center” has always been a cringe moment for me because this assumes release of security responsibility since ‘someone else will take care of it’.…

Get the latest security news in your inbox.

Subscribe via Email

July 10, 2019 | Sam Bocetta

What is Chaos Engineering in penetration testing?

Being proactive is the key to staying safe online, especially for businesses and organizations that operate websites and mobile applications. If you wait for threats to appear, then in most cases it is too late to defend against them. Many data breaches come about this way, with hackers uncovering security gaps that had gone previously undetected. The average web developer…

July 8, 2019 | Karoline Gore

File transfer security risks and how to avoid them

Ransomware attacks increased by 105% in the first quarter of 2019, according to Beazley’s tally of insurance claims and data analytics. Other alarming reports show that new variants of Ransomware keep appearing almost every month. In addition, two years after the WannaCry Ransomware attacks, 1.7 million computers still remain at risk in 2019 according to TechCrunch. Fortunately, there are cybersecurity solutions that…

July 3, 2019 | Shira Rubinoff

AT&T Cybersecurity Maintains Very Strong Ranking After Acquisition of AlienVault

The results are in, and once again AT&T’s Cybersecurity is recognized as an industry leader by securing its third consecutive ranking of “very strong” in Global Data’s annual product report. AT&T is the only company to achieve this hat-trick rating in all of Global Data’s seven categories of…

July 2, 2019 | Bob Covello

Be the leader in the new password-volution: memorized secrets

Remember when you were younger, and you wanted to do something that all your friends were doing, yet you knew your parents would never approve?  Perhaps it was skating in that home-made “Half-Pipe”, or that time you wanted to try some equally dangerous stunt? Of course, your parents disapproved, to which you probably responded with the time-honored…

July 1, 2019 | Kate Brew

Linux Servers Under Worm Attack Via Exim Flaw | AT&T ThreatTraq

Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers.  I really enjoy them; you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent feature on ThreatTraq.  The video features Michael…

June 27, 2019 | Bindu Sundaresan

What is digital trust and why does your CSO care about it?

As I talk to organizations in the AT&T Executive Briefing Center and learn more about the different types of business and enterprise security goals, one of the resonating themes across different industry verticals today is Digital Trust. The goal is to build trust in the system between the consumers of your services and the enterprise. To achieve this…

June 25, 2019 | Carlos Garcia

Suricata IDS: an overview of threading capabilities

A common discussion in the security industry is how to improve the effectiveness of detection and prevention systems. You can find tons of documentation and books about: The Defender's Dilemma, Blue Team vs Red Team, A Comprehensive Security Approach, among others. However, in any organization, it is very important to move beyond theory and implement specific solutions to detect…

June 24, 2019 | Kim Crawley

An overview on insider attacks and threat awareness

Organizations usually focus on cyber threats which are external in origin. These include anti-malware, external firewalls, DDoS attack mitigation, external data loss prevention, and the list goes on. That's great, external cyber attacks are very common so it's vital to protect your networks from unauthorized access and malicious penetration. The internet and unauthorized physical access to your facilities…

June 19, 2019 | Kate Brew

GandCrab Ransomware Shuts Its Doors | AT&T ThreatTraq

Every week, the AT&T Chief Security Office produces a set of videos with helpful information and news commentary for InfoSec practitioners and researchers.  I really enjoy them, and you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent feature on ThreatTraq.  The video features Joe Harten,…

June 18, 2019 | Kate Brew

SOAR with AT&T Cybersecurity and Dark Reading

Watch the full video on our site. If you prefer reading, here’s the full transcript 😊 Terry Sweeney - Contributing Editor, Dark Reading Sanjay Ramnath - Associate Vice President, Product Marketing, AT&T Cybersecurity Terry Sweeney: Welcome back to the Dark Reading News Desk. We’re here at the RSA Conference in…

Watch a Demo ›
Get Price Free Trial