Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AT&T Cybersecurity

Google takes a bold step toward securing your Gmail, but not without many complaints

Many Gmail users were recently greeted with a message that alerted them that 2-step verification will be required to log into their accounts starting on November 9th (today). While many in the security community have been advising people to turn on 2-factor, 2-step, or any other secondary security method on every account as a way to protect the login process, the Twitterverse showed that many people were unhappy with Google’s implementation of this mandatory change.

AT&T Cybersecurity's managed SASE service wins CyberSecurity Breakthrough award

AT&T Business is all-in on Secure Access Service Edge (SASE) as an essential framework for security-driven networking. As the AT&T Cybersecurity team endeavors to help organizations transition to SASE frameworks, it’s picking up accolades not only from valued AT&T customers but also the broader cybersecurity community.

Why retailers must adopt a Zero Trust approach during this holiday season

The pandemic accelerated a trend that was already gaining increased traction: the preference for shopping online. The last eighteen months have brought a surge to the eCommerce industry, with consumers of all ages learning how to order items online. Competition has never been fiercer for online retailers, which means it’s not just quality products and customer service that companies must focus on.

Reversing a binary using GDB: tutorial for Reverse Engineers

Reversing binaries is an essential skill if you want to pursue a career as exploit developer, reverse engineer or programming. The GNU Project debugger is a widely used debugger for debugging C and C++ applications on UNIX systems. A debugger is a developer's best friend to figure out software bugs and issues. This tutorial intends to be beneficial to all developers who want to create reliable and fault-free software.

Starting with strategy - A multi-part series on building a robust cybersecurity program

Today, many organizations look at information security and governance as a baker would icing on a cake. Something you apply at the very end, mostly to make it look better and add a bit of flavor. It isn’t a structural component or key ingredient, its simply there to cover up the raw product. As can be expected, icing cannot save a cake that’s missing key ingredients like sugar, or eggs.

6 Business functions that will benefit from cybersecurity automation

Enterprises and small businesses alike are facing challenges that impact their ability to maintain adequate cybersecurity. Budget constraints and limited staff are just a couple of reasons why businesses have become more susceptible to cyberattacks. Hackers are becoming smarter, and the tools that teams deploy are growing in number, leading to fragmentation and increased vulnerabilities.

Code similarity analysis with r2diaphora

Binary diffing, a technique for comparing binaries, can be a powerful tool to facilitate malware analysis and perform malware family attribution. This blog post describes how AT&T Alien Labs is leveraging binary diffing and code analysis to reduce reverse-engineering time and generate threat intelligence.

Every month should be Cybersecurity Awareness Month!

While October is famous for National Cybersecurity Awareness Month, and we provide resources and recommendations for our customers, really every month should focus on this business-critical topic. Given the frequency of Ransomware attacks, all industries need to be increasingly vigilant. This includes many aspects of cybersecurity, such as user training, endpoint security, network security, vulnerability management, and detection and response to incidents.

Trends in connected homes in 2021 - Improved security and connectivity

It’s becoming more popular in 2021 to have a smart home with connected devices capable of communicating with each other. It’s expected that smart home spending will reach more than $141 billion by 2023, and the number of smart homes will surpass 300 million by 2023. Some connected home trends are dominating the headlines in 2021, including more tech for the fitness-conscious, multifamily smart homes, and a higher level of security and privacy in connected homes.

Introducing AT&T Managed Extended Detection and Response (XDR)

In today’s dynamic threat landscape, having different tools to meet unique security requirements helps keep data protected. However, businesses today have 10 to 50+ security tools and consequently spend too much time managing them instead of protecting against cybercrime. This security tool overload creates internal challenges and potentially distracts from the primary business mission.