Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Key considerations when choosing a business ISP

A Business Internet Service Provider (ISP) is a company that offers internet access and related services to businesses. Unlike residential ISPs, business ISPs are tailored to meet the higher demands and unique needs of businesses, such as greater reliability, faster speeds, dedicated support, and enhanced security. The choice of an ISP can significantly impact a company's operational efficiency, communication, and overall success.

Enhancing Patient Experience: How Virtual Reality Is Transforming Dental Visits

Welcome to the future of dental care where virtual reality (VR) is revolutionizing the patient experience. In this article, we delve into the transformative impact of VR technology on dental visits, exploring its benefits and implications for both patients and practitioners.
Featured Post

Leveraging Threat Intelligence for Regulatory Compliance

The US Government recently announced that state-sponsored Chinese cyber group Volt Typhoon has compromised multiple critical infrastructure organisations' IT networks in the US and is preparing "disruptive or destructive cyber attacks" against communications, energy, transport, water and waste water systems. The announcement, which was supported by national cybersecurity agencies in Australia, Canada, UK, and New Zealand, is a sobering reminder that modern life relies on digital networks. From healthcare, banking, and socialising, to energy, water, local and national government - everything has a digital aspect.

State Government Organization Network Breach: SafeBreach Coverage for US-CERT Alert (AA24-046A)

On February 15th, the Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) issued an advisory highlighting the results of their incident response investigation into a state government organization’s network whose sensitive data including host/user details and other pertinent metadata were posted to the dark web.

Strengthening small utilities: The power of public-private partnership

In the wake of recent cyber attacks against US water utilities, the vulnerability of local entities dependent on operational technology (OT) has been starkly highlighted. This danger was further emphasized last week when Congress held a hearing titled Securing Operational Technology: A Deep Dive into the Water Sector. Witnesses at the hearing painted a stark picture of the significant cybersecurity risks facing small utility companies today.

PCI DSS Requirement 6 - Changes from v3.2.1 to v4.0 Explained

Welcome back to our series on PCI DSS Requirement Changes from v3.2.1 to v4.0. Today, we’re discussing Requirement 6, which is crucial for protecting cardholder data. It mandates the use of vendor-supplied security patches and secure coding practices for in-house developed applications. These measures help mitigate vulnerabilities that hackers could exploit. The requirement also emphasizes the importance of vigilance in identifying and remediating vulnerabilities.

Strong results in third-party testing confirm AT&T Cybersecurity as an XDR leader

Here at AT&T Cybersecurity, we know that the technology powering our managed detection and response services is solid—and we’ve got documentation to prove it. But we also know you’ve probably read your share of marketing materials making claims with nothing to back them up, so when we get the opportunity to share third-party metrics that support what we’ve been saying, we jump on it.