Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

SOAR with AT&T Cybersecurity and Dark Reading

Watch the full video on our site. If you prefer reading, here’s the full transcript Terry Sweeney - Contributing Editor, Dark Reading Sanjay Ramnath - Associate Vice President, Product Marketing, AT&T Cybersecurity Terry Sweeney: Welcome back to the Dark Reading News Desk. We’re here at the RSA Conference in San Francisco.

Countdown to CCPA: 5 Questions You Need to Ask

The California Consumer Privacy Act of 2018, known as CCPA, is a data privacy law aimed at protecting the personal information of California consumers. Frequently compared to the UK’s expansive GDPR, CCPA will have a big impact on how companies collect, store, and process personal information of California consumers.

Notable Ransomware Attacks from 2019 and Lessons Learned

“We have your precious data! Pay us or lose it forever!” This is a message no organization or individual ever wants to see. Nevertheless, given trends over time in cyber security, ransomware remains a concern for many organizations. Here is a look at interesting examples of successful ransomware attacks and some lessons we can learn from each.

Practical security recommendations - for you and your business

Cybercrime is costing UK businesses billions each and every year. Small businesses in particular are under threat, as they often take a more relaxed approach and a ‘not much to steal’ mindset. However, this lack of diligence has caused many companies to close permanently. Let’s ensure yours isn’t one of them. Time to start making the issue a priority! Here are some practical security recommendations for you and your business.

Miles Ahead in the Cloud - Using Sumo Logic for security and compliance challenges

Digital innovation and transformation are critical strategies in keeping pace with competitors and customer needs in today's rapidly changing environment. Many organizations are moving to the cloud to take advantage of the operational and financial gains available in this new environment. But these organizations are also quickly learning that their legacy security and compliance tools, including their SIEMs, are not able to provide the insights they need.