May 8, 2019 | Kelley Bryant

The art of pushing left in application security

Today, software is being developed at a breakneck speed. Agile development and the aggressive adoption of DevOps is leading to an abundance of functionality and feature sets, or pieces of code pushed out to consumers at a record pace.  These one-click opportunities may indeed get us what we want, however, the game remains the same. The Achilles Heel is…

May 7, 2019 | Javvad Malik

What does the CISO say? A Tweetchat roundup

Note from the editor: Javvad has left AT&T Cybersecurity, but on his last day he penned a final blog, recapping the awesome tweet chat we had with all star CISO's. Here is Javvad's heroic working-the-last-day blog: On 18th April 2019, @ATTCyber gathered a panel of CISOs (and recovering CISOs) for a tweetchat to discuss some of the…

Get the latest security news in your inbox.

Subscribe via Email

May 6, 2019 | Bob Covello

Don’t focus 100% on security

In recent months, I have met many people who are interested in working in Cybersecurity.  This is wonderful, especially given the amount of available employment opportunities in this field. Like any ambitious person, the people who approach me to ask about getting into the field want to fully immerse themselves in “all things security”.  This is…

April 30, 2019 | Katia Dean

What everybody ought to know about mentoring in InfoSec

It seems like everyone wants to get into the field of cyber security. Regarding this, having a mentor is important for your cyber career. A mentor is known to be knowledgeable in the field, will guide you along your path providing direction from what they have learned and motivate you throughout your career. When I set out on this path,…

April 29, 2019 | Kim Crawley

How to create a security culture in your company in 2019

Cybersecurity isn’t just about the computer hardware, software, and networking technicalities that it pertains to. It is also about how human beings behave with computer technology–and what sort of cyber risks that behavior can create. Culture influences behavior, and the security culture of your company can have an immense effect on your cybersecurity. I’ll explain why. What…

April 26, 2019 | Javvad Malik

Things I hearted this week 26th April 2019

Hello and welcome to a very special edition of things I hearted this week as this may be the last time you’ll read this column here on the AlienVault (AT&T Cybersecurity) blog. And I’ve probably already said too much. Onwards with the things I hearted. How to help dissidents with technology? “Lift all…

April 25, 2019 | Julia Kisielius

AT&T Cybersecurity develops new AlienApp for Box for highly secure content management in the cloud

Today, I’m excited to share that we have released AlienApp for Box, a new security integration between AT&T Cybersecurity and Box, a leader in cloud content management. This new feature within USM Anywhere takes advantage of Box's granular logging capabilities and powerful APIs to add an additional layer of security for Box Enterprise customers that…

April 24, 2019 | Jennia Hizver

Making your MFA secure: tips from a security architect

Many security breaches take place when attackers gain access to Internet-facing applications by using compromised credentials. As an added layer of security against leaked credentials, organizations have been implementing multi-factor authentication (MFA) mechanisms to verify the identity of users connecting to critical online assets. One of many multi-step authentication methods is phone call back. The authentication process starts with a…

April 23, 2019 | Javvad Malik

Security through transparency

There are many things within Information security that pundits have been claiming are dead, or should be killed by fire - passwords are usually found at the centre of such debates. But this isn’t a post about passwords, it’s a post about honesty, and trust. But let’s first take a look at the other…

April 18, 2019 | Karoline Gore

Ethical hacking as a post-graduation opportunity

The world of cybersecurity is an ever-changing one of constant preemptive preparation, where companies are forced to hunt for any kinks in their defenses to ensure that they’re as protected as possible. Working as an ethical hacker allows information technology graduates to come into the job market and aid companies in finding those kinks so that…

April 17, 2019 | Joe Robinson

Siegeware and BAS attacks, an emerging threat

As technological solutions to cybercrime become increasingly advanced, able to preempt attacks and weed out vulnerabilities before they’re widely known, attackers also  become more adept at cloaking their presence and concealing their intent. The targets of attacks also change with the times. Hacking websites and bank accounts is old-hat, some of the most threatening dangers to the…

April 16, 2019 | Mike Klepper

Security is Simple as 1, 2, 3

Keeping an organization’s IT assets secure in this day and age is a challenge.  The sands of the information security landscape are constantly shifting, and it can be difficult for practitioners to find solid footing; to identify those initiatives that will net the greatest return on security spend.  Each day seems to bring another emerging concern…

Watch a Demo ›
Get Price Free Trial