Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

An Introduction to Security Posture Management

Too often, organizations find themselves stuck in a cycle of reacting to threats; figuring out how to stop a business email compromise attack or trying to find a threat actor who’s activated malware in the system. This leaves often short-staffed and overworked IT teams without the bandwidth to focus on the proactive side of cybersecurity.

By the Numbers: Cloud Security Stats Are In, and They're Not Pretty

With digital transformation having taken a front seat over the past 3 years due to a global shift in how people do business, cloud reliance and breaches have skyrocketed. According to G2, half of all organizations are currently cloud native or cloud enabled. It’s not just a matter of accomplishing work, either – it’s storage for vital digital assets.

Navigating Trust in the Age of Manipulation: Big Tech, Media, and Cyber Warfare

In today's complex information landscape, trust is harder to come by than ever before. Join us as we delve into the unsettling realities of manipulation by both big tech and traditional media. In a world where it seems nearly impossible to find unbiased sources, who can we turn to for reliable information? We explore the notion that trust often lies with those who reinforce our existing beliefs. But here's where cyber warfare takes a chilling turn.

Software Supply Chain Compliance: Ensuring Security and Trust in Your Software and Applications

Software and applications make the world go round. This naturally makes them a top attack target for threat actors, and highlights the importance of robust software supply chain compliance. But how do companies build and implement a compliance strategy that solves the challenges of modern application security? Let’s take a look.

Cybersecurity Sessions S02E03: Bots vs consumers, social media APIs, ticket scalping legislation

In this month’s episode, we start by focusing on the real-world impact of bots (scripts used to automate tasks and exploit business logic). In the UK, bots are being used to book up every available driving test before reselling them for profit; meanwhile in the US, gig workers delivering groceries are losing out to bots that hoard the most profitable delivery jobs. Our panel explains how this happens and discusses what can be done to stop it.

Insider Fraud Prevention: Tips & Tricks for Your Organization

Did you know that even organizations with productive and loyal employees frequently suffer from malicious insiders committing fraud? Such insiders are rather difficult to detect because they mishandle data bit by bit alongside their regular work routine. Moreover, their motives can be unobvious, which makes detecting them even more challenging. In this article, we explore insider fraud and its risks, as well as how to mitigate those risks through a comprehensive insider risk management strategy.

Get the AT&T Cybersecurity Insights Report: Focus on Healthcare

We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights™ Report: Focus on Healthcare. It looks at the edge ecosystem, surveying healthcare IT leaders from around the world, and provides benchmarks for assessing your edge computing plans. This is the 12th edition of our vendor-neutral and forward-looking report.

Keep Identity Real with MFA and Strong Credentials

Would you bet your business on the strength of every employee’s password? If you haven’t deployed business-grade MFA and credentials management throughout your organization, you are probably on the losing end of that bet. Here’s why: Despite the challenges, passwords are not going anywhere any time soon.