Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AT&T Cybersecurity wins SC Media Award for Best Threat Intelligence

Today, SC Media announced the winners of its annual cybersecurity awards for excellence and achievements. At AT&T Cybersecurity we are thrilled that AT&T Alien Labs was awarded Best Threat Intelligence in this prestigious competition. The Alien Labs team works closely with the Open Threat Exchange (OTX), an open and free platform that lets security professionals easily share, research, and validate the latest threats, trends and techniques.

Integrate Sigma detection rules with Datadog Cloud SIEM

As organizations grow, they naturally need to analyze logs from more data sources. But as these data sources expand in number and type, it becomes more difficult for teams to scale their security detection rules to keep up with the ever-changing threat landscape. Sigma is an open source project that aims to address this challenge. By leveraging the expertise of the open source community, Sigma enables security teams to implement out-of-the-box rules that cover a wide range of threat scenarios.

Why is the Finance Sector a Target for Cyber Attacks?

According to the Bank for International Settlements, the financial sector is most targeted by hackers, after the healthcare sector. Finance businesses handle and manage large amounts of financial data, making them prime targets for cybercriminals. According to the Financial Stability Board, a serious cyber incident could destabilize financial systems, impacting critical infrastructure and the economy.

Cybersecurity and Social Responsibility: Ethical Considerations

Cybersecurity is necessary to protect data from criminals. However, the world of cybersecurity is not so simple. Therefore, a discussion of cybersecurity ethics needs to examine the morality of businesses collecting, processing, using, and storing data. How cybersecurity professionals affect security measures is also worth exploring. Businesses and individuals should ask themselves whether the ends justify the means and to what extent they are willing to sacrifice data privacy for data protection.

How To Know if Your Identity Has Been Stolen

Some signs that indicate your identity may have been stolen include seeing charges you didn’t make on your bank account statement, new inquiries on your credit report, an unusual drop in your credit score, credit checks you didn’t initiate, your credentials being posted on the dark web and more. Continue reading to learn more indications that your identity has been stolen and what to do if you’re a victim.

Discover The Best AI Tools: Best Practices To Use It Safely

AI tools have become increasingly popular in various industries as businesses recognize their potential to revolutionize processes and drive innovation. These tools leverage advanced algorithms and machine learning techniques to automate tasks, analyze vast amounts of data, and generate valuable insights. In 2022, around 35% of businesses worldwide used AI tools and 61% of employees say AI helps to improve their work productivity.

3 Best Practices for External Attack Surface Management

Your external attack surface is growing rapidly. The adoption of cloud technologies, business growth, a remote workforce, IoT, and a growing supply chain of digital vendors creates an enormous digital footprint and increased cyber risk. External attack surface management (EASM) can help you mitigate and manage this risk—proactively and at scale.