September 13, 2019 | Skylar Talley

Defining the “R” in Managed Detection and Response (MDR)

This spring, as the product and security operations teams at AT&T Cybersecurity prepared for the launch of our Managed Threat Detection and Response service, it became obvious to us that the market has many different understandings of what “response” could (and should) mean when evaluating an MDR solution. Customers typically want to know: What incident response…

September 11, 2019 | Jason Nelson

Practicing safe charging  

This past June, I attended the 2019 Bitcoin Conference in San Francisco, CA. With the various discussions on Bitcoin, Cryptocurrency, and with the chance to hang out with my favorite Crypto personalities, it was easy to lose myself in all the festivities. While taking a break, I found a seat and decided to charge my iPhone.  The station by where…

Get the latest security news in your inbox.

Subscribe via Email

September 10, 2019 | Tony Tomov

Should small business owners concern themselves with business espionage?

As technological developments have helped turn the world into a global village, they have also made it easier to steal, extract, and communicate confidential information – leading to an increased frequency of corporate espionage. Take Apple for example; despite deploying leading security measures and monitoring activities, the tech giant has had two espionage attempts in one year, foiled just as…

September 9, 2019 | Amy Fletcher

Category 1 cyber threat for UK businesses

Julia Solonina Britain should be prepared for a Category 1 cyber security emergency, according to the National Cyber Security Centre (NCSC). This means that national security, the economy, and even the nation’s lives will be at risk. However, despite this harsh warning, UK businesses still aren’t taking proactive and potentially preventative action to stop these attacks from…

September 5, 2019 | Rich Langston

Ransomware experiences and why IT security professionals have a lot on their minds

Every year we survey visitors to our booth at Black Hat about trending topics.  This year, we asked about ransomware and the ever-increasing complexity of our cybersecurity environment.  The results are very interesting - things may be getting much better, or we may all be collectively in denial.  Let's break it down. We surveyed 145 IT security…

August 22, 2019 | Kim Crawley

How to prevent crime on the Deep Web and Dark Web

Sir Tim Berners-Lee invented the World Wide Web in 1989, and then it became available to the general public by 1991. The web is an internet service that was designed to help scientists and academics exchange information more effectively. But by the late 1990s, the web helped to make the internet popular and accessible to ordinary people all over the world. Over…

August 21, 2019 | Stephen Roe

4 SIEM Use Cases to Improve Enterprise Security

No business will argue against an enterprise-level security solution. With threats coming from every direction, a centralized security platform gives administrators the fighting chance they deserve to stave off malicious attacks. Security information and event management or SIEM systems are considered to be the industry gold standard. While effective, knowing how to use SIEM solutions to reveal valuable insight can…

August 21, 2019 | Devin Morrissey

Cyberbullying and cybersecurity: how are they connected?

Image Source: Pixabay Cyberbullying and cybersecurity incidents and breaches are two common problems in the modern, internet-driven world. The fact that they are both related to the internet is not the only connection they have, however. The two are actually intimately connected issues on multiple levels. It may seem like an odd notion. After all, cyberbullying typically involves using technology…

August 20, 2019 | Haley Mathis

How Bug Bounty programs work

With cybercrime on the rise, companies are always looking for new ways to ensure they are protected. What better way to beat the hackers than to have those same hackers work FOR you. Over the past few years, corporations have turned to Bug Bounty programs as an alternative way to discover software and configuration errors that would’ve otherwise…

August 19, 2019 | Kate Brew

What is r00tz Asylum?

At Black Hat 2019 I had the pleasure to meet some AT&T colleagues who are now my new InfoSec buddies! I met Marc Kolaks and Don Tripp from the Office of the CSO at the AT&T Cybersecurity booth. They told me about the weekend event they were volunteering for at Defcon. So, being nosy I had to…

August 13, 2019 | Karoline Gore

Protecting your home from physical and cyber attacks 

By 2025, it is estimated that there will be over 64 billion IoT devices around the world, with an increasing number being used around the home by mainstream consumers. Although these devices offer convenience and ease, homeowners need to be responsible for ensuring their security and safe upkeep. In the same way that homeowners add security systems to protect the physical…

August 7, 2019 | Daniel Kobialka

What is a SIEM and what are the benefits for business?

Security information and event management (SIEM) technology is transforming the way IT teams identify cyber threats, collect and analyze threat data and respond to security incidents. But what does that all mean? To better understand SIEM, let's take a look at SIEM technology, how it works and its benefits. What is a SIEM? A security information event manager (SIEM)…

Watch a Demo ›
Get Price Free Trial