AT&T Cybersecurity’s edge-to-edge technologies provide phenomenal threat intelligence, collaborative defense, security without the seams, and solutions that fit your business. Our unique, collaborative approach integrates best-of-breed technologies with unrivaled network visibility and actionable threat intelligence from AT&T Alien Labs researchers, Security Operations Center analysts, and machine learning – helping to enable our customers around the globe to anticipate and act on threats to protect their business.
Available On Demand An insider threat is a security threat posed by someone inside or connected to the organization. That could be an employee, former employee, a contractor, or a business partner. They can steal your most sensitive information and assets because they have either the credentials or the knowledge necessary to bypass your security. […]
MSSPs, or Managed Security Service Providers, are at an exciting point where market acceptance, awareness and demand have converged. I view this as a positive for a potential MSSP, but also for the customers and businesses they will protect, enhancing security for everyone. However, excitement and the prospect of profits can create haste, and with […]
During the past few years, the number of data breaches reported has grown substantially. Your CEO has been paying attention and–suddenly–your IT department has a budget for security and compliance. You remember taking a course on cybersecurity in 2003, but, other than that, you’re not sure you have the chops to take on a full security […]
Date: Thursday, December 06, 2018 Time: 02:00 PM Eastern Standard Time Duration: 30 minutes Cloud security is the number one skill and need required in the vast cloud market landscape. The latest data in CompTIA’s 2018 cloud research shows that cloud has officially reached the mainstream. Here are some of the latest stats: 91% of […]
When it comes to data breaches, most agree that it’s not a matter of if, but when. In CyberEdge Group’s 2017 Cyberthreat Defense Report, an astounding 79% of surveyed organizations admitted being victims of cyber attacks, up from 76 percent in 2016 and 70 percent in 2015.1 Given that intrusions are inevitable, it’s important to […]
An orchestrated, automated incident response process can remove much of the friction and improve efficiencies when it comes to incident detection, response, and remediation – allowing security teams to save time and focus on security, not process. This whitepaper explores what security orchestration is and provides examples of incident response automation in action to give […]