Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

By the Numbers: Cloud Security Stats Are In, and They're Not Pretty

With digital transformation having taken a front seat over the past 3 years due to a global shift in how people do business, cloud reliance and breaches have skyrocketed. According to G2, half of all organizations are currently cloud native or cloud enabled. It’s not just a matter of accomplishing work, either – it’s storage for vital digital assets.

Navigating Trust in the Age of Manipulation: Big Tech, Media, and Cyber Warfare

In today's complex information landscape, trust is harder to come by than ever before. Join us as we delve into the unsettling realities of manipulation by both big tech and traditional media. In a world where it seems nearly impossible to find unbiased sources, who can we turn to for reliable information? We explore the notion that trust often lies with those who reinforce our existing beliefs. But here's where cyber warfare takes a chilling turn.

Software Supply Chain Compliance: Ensuring Security and Trust in Your Software and Applications

Software and applications make the world go round. This naturally makes them a top attack target for threat actors, and highlights the importance of robust software supply chain compliance. But how do companies build and implement a compliance strategy that solves the challenges of modern application security? Let’s take a look.

Cybersecurity Sessions S02E03: Bots vs consumers, social media APIs, ticket scalping legislation

In this month’s episode, we start by focusing on the real-world impact of bots (scripts used to automate tasks and exploit business logic). In the UK, bots are being used to book up every available driving test before reselling them for profit; meanwhile in the US, gig workers delivering groceries are losing out to bots that hoard the most profitable delivery jobs. Our panel explains how this happens and discusses what can be done to stop it.

Insider Fraud Prevention: Tips & Tricks for Your Organization

Did you know that even organizations with productive and loyal employees frequently suffer from malicious insiders committing fraud? Such insiders are rather difficult to detect because they mishandle data bit by bit alongside their regular work routine. Moreover, their motives can be unobvious, which makes detecting them even more challenging. In this article, we explore insider fraud and its risks, as well as how to mitigate those risks through a comprehensive insider risk management strategy.

Get the AT&T Cybersecurity Insights Report: Focus on Healthcare

We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights™ Report: Focus on Healthcare. It looks at the edge ecosystem, surveying healthcare IT leaders from around the world, and provides benchmarks for assessing your edge computing plans. This is the 12th edition of our vendor-neutral and forward-looking report.

Keep Identity Real with MFA and Strong Credentials

Would you bet your business on the strength of every employee’s password? If you haven’t deployed business-grade MFA and credentials management throughout your organization, you are probably on the losing end of that bet. Here’s why: Despite the challenges, passwords are not going anywhere any time soon.

Threads : Security Issues You Should Be Aware Of Before Using

Meta’s new app called Threads was launched on the 6th of July 2023 by Mark Zuckerberg. The app is an extension of the Instagram app and everybody is excited to talk about it as it is compared with Twitter. However, the app gained 30 million downloads in its first 16 hours. Currently, the app is available for 100 countries including the United States, Australia, Canada, India and Japan.