Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automation, Made Simple

Hosted in collaboration with Pentamix Security. The world’s leading security and operations teams trust Tines to automate their essential workflows, making them more effective and efficient. Designed by security practitioners for less technical teams on the frontlines, our powerful platform makes it easy to automate any repetitive manual processes, regardless of use-case or complexity. Kevin Davis, Sales Engineer presents how Tines enables teams to do their best work by simultaneously helping them to save time, optimize resources, and minimize room for error.

RKVST - About

Businesses increasingly use external data to make critical decisions. The wrong data leads to bad decisions that import risk, impair reputation, and imperil revenue. Zero-Trust, Critical Shared Assets, Trustworthy AI – all need instant answers to a common question: Who Did What When? RKVST is the infostructure that unites developers and business users in assuring shared data drives the right critical outcomes.

Three new announcements on Nightfall's products

The Nightfall blog is a knowledgebase for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

Featured Post

Fostering a culture of security with a hybrid workforce

Over the past two years, change has been rapid and widespread in the business world. The pandemic forced a frenzied shift to remote work, and the rushed adoption of new tools, workflows, and communication methods. Now, rather than cram back into the office all at once, many companies are testing the waters of hybrid work - either as a stepping stone or an indefinite transformation.

Assessing Cyber Risk: 13 Critical Questions for the Board

Boards of Directors constantly need to be educated about and aware of their organizations’ cybersecurity posture. Regulations hold them responsible for decision-making and governance. Meanwhile, increased ransomware attacks pose a financial risk to their shareholders. To enhance the risk analysis, questions like these can provide visibility into the company’s strategy.

Introducing the Palo Alto Networks Panorama Advanced AlienApp

Here at AT&T Cybersecurity, we believe cyber protection should include multiple layers and cover as much ground as possible. Having full visibility into threats on the network and being able to automate actions against them not only reduces an organization’s risk but also frees up time for security teams to focus on other high-value security tasks.