Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest AT&T Data Breach Highlights the Need to Double Down on Cybersecurity Basics

AT&T reported on July 12 that an internal investigation had revealed that the telecommunication provider had been victimized by a third-party breach,resulting in the compromise of records of calls and texts of nearly all of AT&T’s cellular customers. An AT&T spokesperson confirmed to a news source that the breach resulted from of the data stolen from cloud storage firm Snowflake.

Effective Identity Threat Response with Teleport

With the rise of infrastructure complexity, organizations must improve their strategies to quickly investigate and mitigate unauthorized system access and internal identity threats. Teleport has already highlighted the importance of identity threat detection and response and introduced features to support security incident containment. This article builds on these ideas by presenting additional metrics to detect suspicious employee behavior and options for expanding detection capabilities.

Fix key cloud security risks with version 2 of the Essential Cloud Security Controls Ruleset

Cloud security teams are faced with an ever-increasing number of challenges. Attackers are focusing on more cloud-native attacks than ever. Meanwhile, the number of cloud service offerings—and by extension, the number of misconfigurations in them—is only growing. And there is always the risk that a sophisticated adversary could abuse a vulnerability in a cloud service provider to target cloud customers.

What's the buzz about NIS 2?

The latest version of the Network and Information Security Directive (NIS 2) has severe implications for companies that provide services or carry out activities in the European Union (EU). NIS 2’s goal is to establish a higher level of security and cyber resilience for member EU states in 18 essential industry sectors. Violations can lead to substantial fines, legal liability and even criminal sanctions on an individual level.

What Can Hackers Do With Your Phone Number?

You might think that a threat actor only having your phone number isn’t dangerous, but it can be, which is why it’s important to learn what hackers can do with it. With just your phone number, hackers can send you phishing texts and calls, flood your phone with spam calls, spoof your phone number, swap your SIM card and even steal your personal information. Continue reading to learn more about what hackers can do with your phone number and tips for keeping yourself safe.

Boosting America's digital defense: Key takeaways from the FY 2026 budget priorities

Ahead of the new US federal fiscal year beginning October 1, the Office of Management and Budget (OMB) and the Office of the National Cyber Director (ONCD) released a memorandum titled Administration Cybersecurity Priorities for the FY 2026 Budget. The memo outlines a comprehensive roadmap for federal agencies and provides crucial guidance for agency heads as they formulate their fiscal year 2026 budget submissions in furtherance of the National Cybersecurity Strategy.

The Evolving Role of CISOs in an AI-enhanced Cybersecurity World

As businesses increasingly rely on digital infrastructures, the threats that aim to exploit these technologies also evolve. It’s no longer just about safeguarding against unauthorized access; it’s about understanding and mitigating the complex risks introduced by AI and machine learning—topics I’ve often discussed, emphasizing the need for an advanced cybersecurity strategy that evolves as quickly as the technologies it aims to protect.