Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Introducing the Palo Alto Networks Panorama Advanced AlienApp

Here at AT&T Cybersecurity, we believe cyber protection should include multiple layers and cover as much ground as possible. Having full visibility into threats on the network and being able to automate actions against them not only reduces an organization’s risk but also frees up time for security teams to focus on other high-value security tasks.

Everything You Need to Know About Open Banking Security

Financial services have developed at a breakneck pace, resulting in fierce competition among financial technologies. These services in the digital age must be characterized by three words: rapid, efficient, and intuitive. It is no longer necessary to wait in queues to speak with a bank teller. Consumers today want to manage their accounts using their smartphones, and banks want to earn their loyalty. What is the common ground? Using modern technologies to find new methods of doing things.

Introducing Snyk developer-first security into the Terraform Cloud workflow

With the rise in popularity of technologies such as HashiCorp Terraform, Docker, and Kubernetes, developers are writing and maintaining more and more configurations in addition to building the application itself. The growing use of infrastructure as code presents security complexity and the potential for risk that developers often struggle with as their workloads increase and more advanced skills are required.

The Top Cyber Attacks of September 2021

September confirmed some things we already knew about the current state of cybercrime: While undersecured corporate targets remain tempting targets for hackers, the situation is increasingly worse for data-rich organizations such as governments, schools, and healthcare facilities. All of those sectors had cause for concern as the month drew to a close.

Automating Cloud Security Posture Management Remediation

When we discuss cybersecurity and the threat of cyber attacks, many may conjure up the image of skillful hackers launching their attacks by way of undiscovered vulnerabilities or using cutting-edge technology. While this may be the case for some attacks, more often than not, vulnerabilities are revealed as a result of careless configuration and inattention to detail. Doors are left open and provide opportunities for attacks.

When should a startup call the FBI

For this 11th episode of Access Control Podcast, a podcast providing practical security advice for startups, Developer Relations Engineer at Teleport Ben Arent chats with Elvis Chan. Elvis is Assistant Special Agent in charge assigned to the San Francisco FBI Field office. Chan manages a squad responsible for investigating national security cyber matters and has over 14 years of experience in the bureau.

WatchGuard Firebox M290 Rotation & Highlights

Because smaller companies are generally less protected and easier to break into, small business has become the new big target for cyberattacks. The Firebox M290 firewall is specifically engineered to defend all types of small businesses against attacks that are no less fierce than those targeting larger organizations.