AT&T Cybersecurity

San Mateo, CA, USA
Jan 18, 2022   |  By Tim Hazzard
So, to what extent are we able to protect ourselves from Cybersecurity events? With the alphabet soup of acronyms out there such as NIST, ISO, SOC, CISA, DevSecOps, etc…… protecting your business from Cybersecurity threats can be overwhelming. Making Cybersecurity a priority can save your business down the road. Threat Actors, once in, may lay dormant for months much like a human virus.
Jan 12, 2022   |  By Theresa Lanowitz
At times, the quest to stay on top of web application security can seem futile. It seems as though the adversaries are always a step ahead, and all we can do is try our best to contain the breaches. In this blog, we’ll look at the root causes of concern for today's CISO and share some practical strategies to deter cybercriminals.
Jan 11, 2022   |  By Lisa Ashjian
Enterprises know they need defenses integrated into each aspect of their network while not being an inhibitor to innovation. Digital transformation realized through new 5G-enabled IoT, Operational Technologies (OT) and IT use cases are no exception. Therefore, security teams need to take a closer look at the best technology to support this innovation.
Jan 10, 2022   |  By Bob Covello
I was logging into one of my favorite online shopping sites the other day, and, as with all my other sites, I was presented with the multi-factor authentication prompt to complete the login process. Anyone who knows me, knows that I have been a long-time supporter of multi-factor, or 2-step verification of any kind.
Jan 6, 2022   |  By Samantha Clark
This blog was written by an independent guest blogger. Online transactions are essential for every modern business. From online shopping to banking, transferring funds, and sending invoices, online transactions ensure utter convenience and efficiency. However, the familiarity of making financial transactions online can make people forget about security and all the dangers that they may be facing. On top of that, new cybersecurity threats keep popping up constantly.
Jan 5, 2022   |  By Will Eborall
Whether organizations call it digital transformation or just using technology to create opportunities for new, easier ways to work, one thing is certain. Businesses increasingly need to find simpler ways to securely build and manage new kinds of connections that support an era of: This is exactly the drive behind the latest collaboration between the cybersecurity and networking experts at AT&T and Cisco.
Jan 4, 2022   |  By Devin Morrissey
This blog was written by an independent guest blogger. Technology in healthcare has the potential to make all the difference in terms of safety outcomes. Right now, modern tech is pushing the envelope of what is possible in the doctor’s office and the patient’s home, as telehealth and artificial intelligence transform the landscape of medical care. But technology isn’t always safe.
Dec 29, 2021   |  By Irfan Shakeel
This article explores how you can locate Insecure direct object references (IDORs) using Burp Suite. Primarily, there are two ways to test the IDOR flaw, manual and semi-automated. For automation, this article focuses on the Autorize Plugin in Burp Suite.
Dec 23, 2021   |  By Ofer Caspi
Malicious actors always try to be creative and find new ways to trick people into a scam. In this case a new website is offering 75% discount on all Timberland shoes. The information looks almost identical to the original page, but when looking closer questions start to pop.
Dec 22, 2021   |  By Kate Brew
I enjoy being editor and managing this blog so much, I thought I'd share some of the best blogs of 2021. 2022 is right around the corner, but it's also a good time to look back at some 2021 highlights!
Dec 14, 2020   |  By AT&T Cybersecurity
Learn how AT&T Cybersecurity Consultants, AT&T Managed Security Services and AT&T Alien Labs, our global threat intelligence unit, can help make it safer for your business to innovate.
Jun 7, 2019   |  By AT&T Cybersecurity
Keep your business safe with by diagnosing the digital health of your business. Identify vulnerabilities and weaknesses before they become problems.
Apr 23, 2019   |  By AT&T Cybersecurity
This workplace scenario skit shows how easy it is for an employee’s credentials to be compromised, and how AT&T Cybersecurity can help.
Mar 27, 2019   |  By AT&T Cybersecurity
Executives of AT&T Cybersecurity discuss the impact the new business unit will have on both existing customers and the cybersecurity industry.
Dec 20, 2018   |  By AT&T Cybersecurity
Discover the power of the unified security platform approach to security at AlienVault® in this brief 10-minute introduction video.
Sep 6, 2018   |  By AT&T Cybersecurity
AlienVault USM simplifies threat detection and analysis. Our unified platform includes pre-integrated tools combined with up-to-the-minute threat intelligence and delivers an easy, effective way to accelerate your threat detection and response. Additionally, our Kill Chain Taxonomy allows you to focus your attention on the most important threats, with attacks classified into five categories and contextual information to help you understand attack intent and threat severity quickly.
Aug 22, 2018   |  By AT&T Cybersecurity
Russ Spitler, AlienVault SVP of Product, discusses how to effectively leverage crowd-sourced threat intelligence in detecting and responding to security threats.
Jul 30, 2018   |  By AT&T Cybersecurity
In this 2-minute video, AlienVault's Javvad Malik explains why endpoint detection and response (EDR) is an essential part of a robust security and compliance program. AlienVault USM Anywhere includes EDR capabilities as part of the Unified Security Management (USM) platform.
Jul 27, 2018   |  By AT&T Cybersecurity
This short video discusses the IT challenges SMB and mid-market organizations face in combating cybersecurity. Listen to the benefits of outsourcing your security monitoring to a Managed Security Service Provider (MSSP) for threat detection, response and compliance.
Jul 10, 2018   |  By AT&T Cybersecurity
AlienVault VP of Global Channels Mike LaPeters talks to ISMG about the industry skills shortage and how MSSPs can help companies react and respond to security threats.
Oct 22, 2018   |  By AT&T Cybersecurity
Phenomenal security. Phenomenal partnership. At AlienVault, we understand that customers rely on your expertise to deliver world-class security solutions specifically designed to protect their unique business. We also know that vetting partnerships opportunities with security vendors is a critical component to delivering those outcomes.
Oct 22, 2018   |  By AT&T Cybersecurity
The Insider's Guide to Incident Response gives you an in-depth look at the fundamental strategies of efficient and effective incident response for security teams that need to do more with less in today's rapidly changing threat landscape.
Oct 1, 2018   |  By AT&T Cybersecurity
As organizations around the world shift their workloads to Amazon Web Services (AWS) and other popular cloud infrastructure-as-a-service (IaaS) providers, concerns about cloud security continue to rise. According to a 2018 Cloud Security Report from Cybersecurity Insiders, 91% of respondents are concerned about cloud security, an increase of 11% over last year's report.
Oct 1, 2018   |  By AT&T Cybersecurity
Get All 5 Chapters of AlienVault's How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations.
Sep 1, 2018   |  By AT&T Cybersecurity
Criminal organizations and hackers increasingly perceive regional banks and credit unions as attractive targets. That's why we've created this primer-to help IT managers and executives at financial organizations understand not just the top threats they're facing, but also what they can do to fend them off.
Aug 1, 2018   |  By AT&T Cybersecurity
This whitepaper provides an overview of Open Source IDS and the various IDS tools available today. Whether you need to monitor hosts or the networks connecting them to identify the latest threats, these are some of the best open source intrusion detection (IDS) tools available to you.
Jul 1, 2018   |  By AT&T Cybersecurity
With so many open source tools available to help with network security, it can be tricky to figure out where to start, especially if you are an IT generalist who has been tasked with security.

AT&T Cybersecurity has simplified the way organizations detect and respond to today’s ever evolving threat landscape. Our unique and award-winning approach, trusted by thousands of customers, combines the essential security controls of our all-in-one platform, AlienVault Unified Security Management, with the power of AlienVault’s Open Threat Exchange, the world’s largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource-constrained IT teams.

AlienVault® USM Anywhere™ accelerates and centralizes threat detection, incident response, and compliance management for your cloud, on-premises, and hybrid environments. USM Anywhere includes purpose-built cloud sensors that natively monitor your Amazon Web Services (AWS) and Microsoft Azure cloud environments, and cloud applications like Office 365. On premises, lightweight virtual sensors run on Microsoft Hyper-V and VMware ESXi to monitor your virtual private cloud and physical IT infrastructure.

With USM Anywhere, you can rapidly deploy sensors into your cloud and on-premises environments while centrally managing data collection, security analysis, and threat detection from the AlienVault Secure Cloud.