Reducing Alert Fatigue by Streamlining SOC Processes
AT&T Cybersecurity Blog
by hello@alienvault.com
12h ago
The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  We wanted to know what was going on within our vast networks; modern tools have made it possible for us to know too much. Some data is good, so petabytes of data is better, right? In theory, yes, but we all know that in practice, it really means a barrage of alerts, late nights at the office, and that feeling of guilt when you have to leave some alerts uninvestigated. SOCs today are drowning as t ..read more
Visit website
LevelBlue: Driving Cyber Resilience in October (and Beyond)
AT&T Cybersecurity Blog
by hello@alienvault.com
4d ago
As we navigate the rapidly evolving technology landscape in 2024, Cybersecurity Awareness Month, now in its 21st year, highlights the increasing importance of protecting against the evolving threat environment across all areas of a business. This initiative motivates both individuals and entire organizations to adopt essential practices that enhance online safety. Every October, Cybersecurity Awareness Month focuses on driving a collaborative effort in fostering cyber education, and like in 2023, it promotes the theme - “Secure Our World.” As a Cybersecurity Awareness Month Champion, LevelBlue ..read more
Visit website
Demand Great Cybersecurity Troubleshooting Skills! Going Back to the Basics.
AT&T Cybersecurity Blog
by hello@alienvault.com
1w ago
I get it. There is an intensifying cybersecurity skills gap because the attack surface is rapidly expanding. We get it. But the gap between academic learning and real-world applications in the field of cybersecurity is a notable challenge for many college graduates and “IT-transitioners” from other IT departments or industries into the cybersecurity realm. In the weekly cybersecurity courses that I deliver and in the consulting practice with onsite and online customers, I can see that basic troubleshooting skills are lacking and the big problem with that is that the longer it takes to troubles ..read more
Visit website
People Know Their Data Rights, and They’re Here to Play Ball
AT&T Cybersecurity Blog
by hello@alienvault.com
1w ago
The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  After being the subject of big-box data pillaging for so long, consumers finally demand control over their own natural resources - and they’ll take their business elsewhere if they don’t get it. As individuals see global corporate powers haggle over their personal information, they start to sense just how much their data is worth. And they’re not giving it out for free anymore; in a recent Thales ..read more
Visit website
Enhancing Cyber Resilience in Transportation Organizations
AT&T Cybersecurity Blog
by hello@alienvault.com
2w ago
2024 Cyber Resilience Research Unveils Transportation Sector Challenges New data illuminates how transportation leaders can prioritize resilience. Transportation organizations find themselves at the intersection of progress and peril in the rapidly evolving digital landscape. The latest data underscores that the trade-offs are significant and pose substantial risks to transportation providers. Get your complimentary copy of the report. One of the foremost obstacles is the disconnect between senior executives and cybersecurity priorities. Despite recognizing cyber resilience as a crucial imper ..read more
Visit website
Enhancing Cyber Resilience in Manufacturing Organizations
AT&T Cybersecurity Blog
by hello@alienvault.com
2w ago
2024 Cyber Resilience Research Unveils Manufacturing Sector Challenges New data illuminates how manufacturing leaders can prioritize resilience. Manufacturing organizations find themselves at the intersection of progress and peril in the rapidly evolving digital landscape. The latest data underscores that the trade-offs are significant and pose substantial risks to manufacturing providers. Get your complimentary copy of the report. One of the foremost obstacles is the disconnect between senior executives and cybersecurity priorities. Despite recognizing cyber resilience as a crucial imperativ ..read more
Visit website
Cybersecurity Threats: Top Risks Facing Your Startup
AT&T Cybersecurity Blog
by hello@alienvault.com
2w ago
The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Delivering a unique value proposition, researching markets, and attracting much-needed starting capital requires all hands on deck for any hopeful startup. Data security, privacy protection, and incident response plans that cover what to do if and when your cyber defenses are compromised don't seem like immediate concerns worth devoting resources to during such times. Yet startups that neglect to ..read more
Visit website
Quantum Computing and Cybersecurity - Preparing for a New Age of Threats
AT&T Cybersecurity Blog
by hello@alienvault.com
2w ago
The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Quantum computing is no longer just a distant technological breakthrough confined to research labs. It is quickly becoming a reality that will transform the digital landscape as we know it. Quantum computers utilize the principles of quantum mechanics to perform complex computations at unprecedented speeds. While this revolutionary computing power has the potential to solve problems that traditio ..read more
Visit website
Physical Security In The Age Of Digital: Access Control System Vulnerabilities
AT&T Cybersecurity Blog
by hello@alienvault.com
2w ago
The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Access control systems are the physical form of the layers of data, credential and identity controls underpinning the systems relied on every day. Yet, they can be an afterthought; even the most high-profile breaches of physical security systems can take years to rectify. Security Week highlights the vulnerabilities affecting Nice Linear, a widely used proprietary system in the world of smar ..read more
Visit website
Tackling the Unique Cybersecurity Challenges of Online Learning Platforms
AT&T Cybersecurity Blog
by hello@alienvault.com
3w ago
The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Online learning has expanded access to education across all levels. However, as beneficial as these platforms can be, they pose unique cybersecurity risks. Securing e-learning platforms will become increasingly crucial as more school systems embrace this technology. The Challenge of Securing Online Learning Online education’s vast amount of sensitive data is its most prominent risk. These platfor ..read more
Visit website

Follow AT&T Cybersecurity Blog on FeedSpot

Continue with Google
Continue with Apple
OR