AT&T Cybersecurity Blog
5,027 FOLLOWERS
AT&T Cybersecurity blogs offer news on emerging threats and practical advice to simplify threat detection, incident response, and compliance management.
AT&T Cybersecurity Blog
12h ago
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.
We wanted to know what was going on within our vast networks; modern tools have made it possible for us to know too much.
Some data is good, so petabytes of data is better, right? In theory, yes, but we all know that in practice, it really means a barrage of alerts, late nights at the office, and that feeling of guilt when you have to leave some alerts uninvestigated. SOCs today are drowning as t ..read more
AT&T Cybersecurity Blog
4d ago
As we navigate the rapidly evolving technology landscape in 2024, Cybersecurity Awareness Month, now in its 21st year, highlights the increasing importance of protecting against the evolving threat environment across all areas of a business. This initiative motivates both individuals and entire organizations to adopt essential practices that enhance online safety.
Every October, Cybersecurity Awareness Month focuses on driving a collaborative effort in fostering cyber education, and like in 2023, it promotes the theme - “Secure Our World.”
As a Cybersecurity Awareness Month Champion, LevelBlue ..read more
AT&T Cybersecurity Blog
1w ago
I get it.
There is an intensifying cybersecurity skills gap because the attack surface is rapidly expanding.
We get it.
But the gap between academic learning and real-world applications in the field of cybersecurity is a notable challenge for many college graduates and “IT-transitioners” from other IT departments or industries into the cybersecurity realm.
In the weekly cybersecurity courses that I deliver and in the consulting practice with onsite and online customers, I can see that basic troubleshooting skills are lacking and the big problem with that is that the longer it takes to troubles ..read more
AT&T Cybersecurity Blog
1w ago
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.
After being the subject of big-box data pillaging for so long, consumers finally demand control over their own natural resources - and they’ll take their business elsewhere if they don’t get it.
As individuals see global corporate powers haggle over their personal information, they start to sense just how much their data is worth. And they’re not giving it out for free anymore; in a recent Thales ..read more
AT&T Cybersecurity Blog
2w ago
2024 Cyber Resilience Research Unveils Transportation Sector Challenges
New data illuminates how transportation leaders can prioritize resilience.
Transportation organizations find themselves at the intersection of progress and peril in the rapidly evolving digital landscape. The latest data underscores that the trade-offs are significant and pose substantial risks to transportation providers.
Get your complimentary copy of the report.
One of the foremost obstacles is the disconnect between senior executives and cybersecurity priorities. Despite recognizing cyber resilience as a crucial imper ..read more
AT&T Cybersecurity Blog
2w ago
2024 Cyber Resilience Research Unveils Manufacturing Sector Challenges
New data illuminates how manufacturing leaders can prioritize resilience.
Manufacturing organizations find themselves at the intersection of progress and peril in the rapidly evolving digital landscape. The latest data underscores that the trade-offs are significant and pose substantial risks to manufacturing providers.
Get your complimentary copy of the report.
One of the foremost obstacles is the disconnect between senior executives and cybersecurity priorities. Despite recognizing cyber resilience as a crucial imperativ ..read more
AT&T Cybersecurity Blog
2w ago
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.
Delivering a unique value proposition, researching markets, and attracting much-needed starting capital requires all hands on deck for any hopeful startup. Data security, privacy protection, and incident response plans that cover what to do if and when your cyber defenses are compromised don't seem like immediate concerns worth devoting resources to during such times.
Yet startups that neglect to ..read more
AT&T Cybersecurity Blog
2w ago
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.
Quantum computing is no longer just a distant technological breakthrough confined to research labs. It is quickly becoming a reality that will transform the digital landscape as we know it. Quantum computers utilize the principles of quantum mechanics to perform complex computations at unprecedented speeds. While this revolutionary computing power has the potential to solve problems that traditio ..read more
AT&T Cybersecurity Blog
2w ago
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.
Access control systems are the physical form of the layers of data, credential and identity controls underpinning the systems relied on every day. Yet, they can be an afterthought; even the most high-profile breaches of physical security systems can take years to rectify. Security Week highlights the vulnerabilities affecting Nice Linear, a widely used proprietary system in the world of smar ..read more
AT&T Cybersecurity Blog
3w ago
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.
Online learning has expanded access to education across all levels. However, as beneficial as these platforms can be, they pose unique cybersecurity risks. Securing e-learning platforms will become increasingly crucial as more school systems embrace this technology.
The Challenge of Securing Online Learning
Online education’s vast amount of sensitive data is its most prominent risk. These platfor ..read more