Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The impact of blockchain technology on the future of finance

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The future of finance is being reshaped by blockchain technology. This revolutionary technology has the potential to revolutionize how people and businesses interact with money, from offering greater transparency and better security to faster speeds and lower costs.

Cybersecurity - Change is coming and that's a good thing

Those words were spoken by the US National Security Advisor way back in 2005, and it is remarkable to see how prescient they were. The economy is not only supported by the cyber world, but that world is entirely data driven. Data has become a primary focus, not just for regulatory fodder, but for business survival.

Cloud Threats Memo: North-Korean State-Sponsored Threat Actors Continue to Exploit Legitimate Cloud Services

Be the first to receive the Cloud Threats Memo directly in your inbox by subscribing here. While the most common cloud apps are also the most exploited for delivering malicious content, opportunistic and state-sponsored threat actors are constantly looking for additional cloud services to leverage throughout multiple stages of the attack chain.

Active Directory Security Groups Best Practices

Active Directory security groups are used to grant users permissions to IT resources. Each security group is assigned a set of access rights, and then users are made members of the appropriate groups. Done right, this approach enables an accurate, role-based approach to user management and reduces IT workload.

Top Best Practices to Unlock the Power of Ultimate Programming

Do you desire the key to ultimate programming’s power? If so, you should adopt software development and programming best practices. These techniques assist developers in achieving their coding objectives, from generating clean code to avoiding coding mistakes. In this Software Developers Guide, you will discover some unforgettable tips that can change your future as a coder. You can use various best practices in addition to coding standards to unlock the potential of ultimate programming.

Password Spraying Today: Everything To Know To Prevent Password Spraying Attacks

Password spraying is a cyber threat that exploits weak passwords in order to easily compromise user accounts. That means it is critical to enforce strict access controls when authenticating users into a system. This article provides an overview of password spraying attacks, including how they work and a few real-world examples of these attacks. I’ll also look at how these attacks impact businesses, along with mechanisms to detect and prevent them.

Splunk Becomes a TISAX Participant

Co-author: Matthias Maier, Product Marketing Director at Splunk. With increasing focus on implementing security standards within the digital supply chain, national and industry-specific certifications have become increasingly important. Today, we are excited to announce that Splunk Services Germany GmbH has become a TISAX participant. The alignment with TISAX requirements demonstrates Splunk’s continued commitment to support the heightened security expectations in the automotive industry.

Navigating the Digital World: Tips for Teaching Your Kids About Internet Safety

Sorry for the bad news, but gone are the days of only worrying about your kids when they leave the house. Our little bundles of joy can now find themselves in serious trouble without ever getting their little butts up off the couch. As a modern parent, one of the most important things you can teach your child is how to stay safe online.

Cyber as a Shared Responsibility; How Rubrik and Zscaler Stepped Forward

The annual RSA Conference always brings exciting product innovations, new partnerships, and lots of debate across cybersecurity and risk practitioners, and last week’s event was no different. RSAC comes on the heels of the recently released National Cybersecurity Strategy which outlined heightened security aspirations for technology providers and organizations that maintain personal data.