Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

The Practitioner's Guide to Information Governance

Over a year into the COVID-19 pandemic, businesses that were already beginning their digital transformation have sped up their efforts even more. Companies have been forced to increase spending on digital transformation in order to cope with a myriad of pandemic-related challenges.

The Interview Series - Corey Williams, CyberArk

Grab a coffee and join us for a chat with CyberArk’s Head of Identity Security Marketing, Corey Williams. If you don’t know them already, CyberArk are leaders in identity security and access management. We talk about how the pandemic has changed the way businesses can (and should!) adopt technology to improve business processes and the challenges that come with this, including how to tackle a lack of understanding and improving communication within your organisation.

AT&T Cybersecurity: 2020 Cybersecurity Must-Haves

2019 taught us that cybersecurity changes quickly. Talent is elusive, resource dwindling, but hacks on the rise. Join Cygilant and AT&T Cybersecurity as we discuss the top trends you need to know about for 2020. We'll provide advice on how to grow your cybersecurity team without hiring, show what needs to be in place in 2020 and give a master class on how to infuse creativity into protecting your small to medium sized business.

AT&T Cybersecurity: Webcast series: How digital transformation is driving cloud security

The broad and often decentralized adoption of cloud services is achieving one business objective at the expense of another. Digital transformation initiatives that utilize cloud services are yielding operational agility and enabling new business models. However, the sheer velocity of cloud adoption, and the complexity of hybrid, multi-cloud environments has introduced additional cyber risk. As a result, many companies are experiencing a cloud security readiness gap, an inability to effectively help to protect organization's use of cloud services.

AT&T Cybersecurity: The Science of Cybersecurity: Best Practices in the New Normal

As organizations adapted quickly to large-scale WFH policies, CISOs and cybersecurity leaders must work in parallel to address new and heightened cyber risks to meet evolving business demands. As you navigate this new workforce dynamic, how you help to protect employees, critical data, and intellectual property requires a new way of thinking.

AT&T Cybersecurity: The Science of Cybersecurity: Digital Transformation in Retail

Retail as an industry has been in a transformational mode for the past several years - add a pandemic and consumers wanting to do everything from the safety of their computer screens and the pace of change increases at an unprecedented rate. Retail organizations are working closely with cybersecurity professionals to lead with a security-first mindset to help provide that personally identifiable information (PII) is protected, the expanded attack surface with an increase in connected devices is highly secure, and the IT systems supporting the retail business are up to date and managed.

AT&T Cybersecurity: Building Blocks for a Cyber Resilient 2021 and beyond

There is no more business as usual. Rapid and dramatic changes concerning how and where personnel perform their daily responsibilities require companies to provide that their security infrastructure, controls, processes, and plans are updated and operational. 2020 has been a year full of change, and we've gone through digital transformation initiatives in the span of a single year that probably would have taken us many years.

AT&T Cybersecurity Insights Report: 5G and the Journey to the Edge

The tenth edition of the AT&T Cybersecurity Insights™ Report: 5G and the Journey to the Edge is here - the data is in, the analysis is complete, and we can't wait to share this new report with you! The use cases for 5G are unlimited and only constrained by imagination! But, with all these new ways to take advantage of low-latency, high-speed, and reliable computing, how are organizations preparing cybersecurity practices, policies, and procedures?

The new normal is actually very normal: Punctuated equilibrium, security cycle theory, and the "New Normal"

In 2020, the world was hit with an unexpected pandemic that changed much of life as many had come to know it. Virtually overnight, masks were required, employees were working remotely, children were home from school, and businesses were locked down to stop the spread of Covid19. In reading the news and social media the term “The New Normal” has taken front and center as the image that is being promoted.