Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Move off On-Prem File Servers to Unlock New Capability and Cost Savings

While there continues to be (limited) debate about on-premises file servers and cloud file storage, the fight is over, and the cloud has won. If you are still in doubt, take a few minutes to review the limitations and costs of on-premises file servers as well as the benefits of cloud file servers.

Cloudflare is faster than Netskope and Zscaler across LATAM

Last CIO Week, we showed you how our network stacks up against competitors across several countries. We demonstrated with our tests that Cloudflare Access is 38% faster than ZScaler (ZPA) worldwide. Today we wanted to focus on LATAM and show how our network performed against Zscaler and Netskope in Argentina, Brazil, Chile, Colombia, Costa Rica, Ecuador, Mexico, Peru, Uruguay and Venezuela.

Protecting Intellectual Property (IP) in the Supply Chain

Data security policies are most often targeted around insider threats and external attackers, but your distributors can equally put intellectual property (IP) protection and other sensitive data at risk. IP is arguably a business’s most valuable asset and can take the form of product designs, software code, media content, etc. Protecting your IP is important because it allows your business to maintain a competitive edge in the market and generate revenue from your innovation.

Threat modeling with Datadog Application Security Management

Threat modeling is a critical part of building high-performing, secure systems. It is responsible for “analyzing representations of a system to highlight concerns about security and privacy characteristics.”1 Creating an effective threat model involves two main steps: system modeling to map out all existing system components and the relationships between them, and threat elicitation to identify areas in the system that could be vulnerable to a security issue.

WatchGuard: The Global Leader in Unified Cybersecurity

WatchGuard's Unified Security Platform™ is uniquely designed for managed service providers to deliver world-class security that increases business scale and velocity while improving operational efficiency. Trusted by more than 17,000 security resellers and service providers to protect over 250,000 customers, the company’s award-winning products and services span network security and intelligence, advanced endpoint protection, multi-factor authentication, and secure Wi-Fi.

The 443 Episode 240 - Rustbuckets and Papercuts

This week on the podcast, we cover a recently discovered macOS malware attack that uses a multi-stage delivery mechanism. Before that, we discuss an actively-exploited vulnerability in the print management software PaperCut, as well as an update on the 3CX supply chain attack. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Ultimate Security Checklist to Launch a Mobile App in Oman - iOS & Android

Your best mobile apps might turn into the worst ones if you neglect the security domain during the development of your app because the vulnerabilities that creep in make the apps more prone to attacks. Cybersecurity Ventures predicts that if cybercrime were an independent country, it would become the world's third-largest economy by 2025.

The CPRA compliance checklist every business should follow in 2023

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The California Privacy Rights Act (CPRA) was passed in November 2020. It amends the 2018 California Consumer Privacy Act (CCPA) introduced in response to rising consumer data privacy concerns.