Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Network Security vs. Application Security: The Complete Guide

Enterprise cybersecurity must constantly evolve to meet the threat posed by new malware variants and increasingly sophisticated hacker tactics, techniques, and procedures. This need drives the way security professionals categorize different technologies and approaches. The difference between network security and application security is an excellent example. These two components of the enterprise IT environment must be treated separately in any modern cybersecurity framework.

6 Behaviors that Hinder Vulnerability Management Maturity

I’ll be honest – the last time someone asked me to assess my behavior was in therapy. Difficult? Yes. Who likes to audit themselves? But that process taught me something valuable: evaluating ourselves, even when uncomfortable, propels us forward. In my many conversations with security professionals, one common theme emerges. We need continuous progress forward as security organizations for the business.

Cloud security vs. traditional security

Data protection principles are the same whether your data sits in a traditional on-premises data center or a cloud environment. However, the way you apply those principles is quite different when it comes to cloud security vs. traditional security. Moving data to the cloud – whether it's a public cloud like AWS, a private cloud or hybrid cloud — introduces new attack surfaces, threats and challenges, so you need to approach security in a new way.

Future of VPNs in Network Security for Workers

The landscape of network security is continuously evolving, and Virtual Private Networks (VPNs) are at the forefront of this change, especially in the context of worker security. As remote work becomes more prevalent and cyber threats more sophisticated, the role of VPNs in ensuring secure and private online activities for workers is more crucial than ever. Let's explore the anticipated advancements and trends in VPN technology that could redefine network security for workers.

All You Ever Wanted to Know About FedRAMP 3PAOs

Third-party assessment organizations, or “3PAOs,” play a crucial role in compliance with the Federal Risk and Authorization Management Program, more commonly known as FedRAMP. 3PAOs assess the offerings of cloud service providers (CSPs), to help those CSPs satisfy their FedRAMP compliance obligations. Moreover, the 3PAOs’ input allows U.S. federal agencies to make informed, risk-based decisions about the CSPs those agencies might want to use.

Hardening Tools 101

Server hardening refers to the actions performed to reduce the server OS and application attack surface. this is done by changing the default configurations of the system’s components (servers, applications, etc.) and removing unnecessary components. Out of the box, Server OS are more function-oriented rather than for security, which means that unnecessary functions are enabled. Default, insecure configurations reflect a potential attack vector.

Cybersecurity and Proxy Season: What Business Executives and Risk Leaders Need to Know

If you’re a business executive or a risk leader, you’re likely familiar with “proxy season,” the time of year when public companies hold their annual general meetings. During these meetings, investors have the opportunity to vote on important issues such as the election of board members and executive compensation.

Get the AT&T Cybersecurity Insights Report: Focus on Finance

We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights Report: Focus on Finance. The report examines the edge ecosystem, surveying finance IT leaders from around the world, and provides benchmarks for assessing your edge computing plans. This is the 12th edition of our vendor-neutral and forward-looking report. Last year’s focus on finance report documented how we secure the data, applications, and endpoints that rely on edge computing (get the 2022 report).