AT&T Cybersecurity

San Mateo, CA, USA
2007
Apr 9, 2021   |  By Derrick Johnson
Customers often ask me: What is the difference between Zero Trust and SASE? My answer is almost always the same: Nothing….and, everything. Both have taken the industry by storm over the last couple of years, and even more so with the security and access demands on the business driven by the existing remote workforce, but both have different implementation approaches. It is important to understand, however, that one does not fully provide the other; in fact, they reinforce each other.
Apr 9, 2021   |  By Mark Stone
The number of users, devices, and resources on company networks is growing exponentially. With this expanding attack surface, a company’s assets, intellectual property, reputation, staff and customer data are all at risk. It’s no wonder cybersecurity has increased in prominence, with many organizations investing in more sophisticated technical solutions. But just because you have all the network security solutions in place, it would be unwise to get complacent about your security posture.
Apr 7, 2021   |  By Tawnya Lancaster
As IT and security leaders adapt to business operations in the “new normal,” they are simultaneously being charged with priming the business to win in the next era of distributed computing. This involves myriad updates to the business’ IT systems, and in some cases, a comprehensive overhaul for network modernization, cloud migration, and edge design and deployment — all tightly wrapped with security.
Apr 6, 2021   |  By Irfan Shakeel
Cyber-attacks are commonly viewed as one of the most severe risks to worldwide security. Cyber-attacks are not the same as they were five years back in aspects of availability and efficiency. Improved technology and more efficient offensive techniques provide the opportunity for cybercriminals to initiate attacks on a vast scale with a higher effect. Intruders employ new methods and launch more comprehensive strategies based on AI to compromise systems.
Apr 2, 2021   |  By Bernard Brode
You’ve just been breached. What do you do next? Depending on personality, preparation, and ability under crisis, there are a variety of responses to choose from, some effective and some not. Hopefully, you’re the rare breed who plans in advance how to respond. Even better if this planning includes how to prevent them. But to execute a logical, effective response, keep reading.
Apr 1, 2021   |  By Lisa Ashjian
Endpoint security is at the forefront of digital transformation due to the very nature of needing to protect devices outside the company’s network perimeter. This started with traditional devices such as laptops and desktops. Endpoint security then quickly expanded to include mobile security, for smartphones and tablets. And, as more data moved to the cloud endpoint security came to include servers and containers, both inside and outside of the network perimeter.
Mar 30, 2021   |  By Nahla Davies
Educational institutions are reaping the many benefits and new possibilities offered by online learning, but these new methods of educational instruction come with serious cyber security concerns. These institutions are also a prime focus for hackers because they often host a lot of sensitive data about teachers and students. Furthermore, schools and universities are an easy target because not every teacher or professor is technologically savvy.
Mar 29, 2021   |  By Theodoros Karasavvas
Cybersecurity is no longer an outlandish concept to many business enterprise executives. What is still relatively unfamiliar to many organizations and their leadership, however, is the task of evaluating their cyber strategy and risk to determine how best to adapt and grow to stay secure while remaining competitive. Executives must initiate thorough evaluations of their existing cybersecurity strategies to figure out which types of new technologies and risk management strategies they need the most.
Mar 26, 2021   |  By Mark Stone
SD-WAN and MPLS are two technologies that are often perceived as either-or solutions. For many organizations, however, SD-WAN and MPLS can complement each other. This article will define and compare the technologies, explaining how, in many cases, they work together. We’ll also explore SD-WAN’s popularity and its role in enabling modern security architectures like SASE.
Mar 25, 2021   |  By Carisa Brockman
What is a strategy? As defined by Merriam Webster…. ‘a carefully developed plan or method for achieving a goal or the skill in developing and undertaking such a plan or method.’ A cybersecurity strategy is extremely important, but many organizations lack a strategy, or they have not kept their strategy and subsequent roadmap current. A strategy is especially important in this day of digital transformation and for key initiatives like Zero Trust.
Dec 14, 2020   |  By AT&T Cybersecurity
Learn how AT&T Cybersecurity Consultants, AT&T Managed Security Services and AT&T Alien Labs, our global threat intelligence unit, can help make it safer for your business to innovate.
Jun 7, 2019   |  By AT&T Cybersecurity
Keep your business safe with by diagnosing the digital health of your business. Identify vulnerabilities and weaknesses before they become problems.
Apr 23, 2019   |  By AT&T Cybersecurity
This workplace scenario skit shows how easy it is for an employee’s credentials to be compromised, and how AT&T Cybersecurity can help.
Mar 27, 2019   |  By AT&T Cybersecurity
Senior IT Security Engineer at Coupa explains how AT&T Cybersecurity and AlienVault bring efficiency to their security program.
Mar 27, 2019   |  By AT&T Cybersecurity
Executives of AT&T Cybersecurity discuss the impact the new business unit will have on both existing customers and the cybersecurity industry.
Dec 20, 2018   |  By AT&T Cybersecurity
Discover the power of the unified security platform approach to security at AlienVault® in this brief 10-minute introduction video.
Sep 6, 2018   |  By AT&T Cybersecurity
AlienVault USM simplifies threat detection and analysis. Our unified platform includes pre-integrated tools combined with up-to-the-minute threat intelligence and delivers an easy, effective way to accelerate your threat detection and response. Additionally, our Kill Chain Taxonomy allows you to focus your attention on the most important threats, with attacks classified into five categories and contextual information to help you understand attack intent and threat severity quickly.
Aug 22, 2018   |  By AT&T Cybersecurity
Russ Spitler, AlienVault SVP of Product, discusses how to effectively leverage crowd-sourced threat intelligence in detecting and responding to security threats.
Jul 30, 2018   |  By AT&T Cybersecurity
In this 2-minute video, AlienVault's Javvad Malik explains why endpoint detection and response (EDR) is an essential part of a robust security and compliance program. AlienVault USM Anywhere includes EDR capabilities as part of the Unified Security Management (USM) platform.
Jul 27, 2018   |  By AT&T Cybersecurity
This short video discusses the IT challenges SMB and mid-market organizations face in combating cybersecurity. Listen to the benefits of outsourcing your security monitoring to a Managed Security Service Provider (MSSP) for threat detection, response and compliance.
Nov 6, 2020   |  By AT&T Cybersecurity
As organizations transform with new business models and new technologies, they must also change the way they provide protection for their systems and processes from cyber risk. This includes rethinking how to better enable distributed and remote workers-a key component for innovation and growth-especially since organizations are witnessing how highly secure, tech-enabled remote workforces help maintain business continuity.
Oct 22, 2018   |  By AT&T Cybersecurity
Phenomenal security. Phenomenal partnership. At AlienVault, we understand that customers rely on your expertise to deliver world-class security solutions specifically designed to protect their unique business. We also know that vetting partnerships opportunities with security vendors is a critical component to delivering those outcomes.
Oct 22, 2018   |  By AT&T Cybersecurity
The Insider's Guide to Incident Response gives you an in-depth look at the fundamental strategies of efficient and effective incident response for security teams that need to do more with less in today's rapidly changing threat landscape.
Oct 1, 2018   |  By AT&T Cybersecurity
As organizations around the world shift their workloads to Amazon Web Services (AWS) and other popular cloud infrastructure-as-a-service (IaaS) providers, concerns about cloud security continue to rise. According to a 2018 Cloud Security Report from Cybersecurity Insiders, 91% of respondents are concerned about cloud security, an increase of 11% over last year's report.
Oct 1, 2018   |  By AT&T Cybersecurity
Get All 5 Chapters of AlienVault's How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations.
Sep 1, 2018   |  By AT&T Cybersecurity
Criminal organizations and hackers increasingly perceive regional banks and credit unions as attractive targets. That's why we've created this primer-to help IT managers and executives at financial organizations understand not just the top threats they're facing, but also what they can do to fend them off.
Aug 1, 2018   |  By AT&T Cybersecurity
This whitepaper provides an overview of Open Source IDS and the various IDS tools available today. Whether you need to monitor hosts or the networks connecting them to identify the latest threats, these are some of the best open source intrusion detection (IDS) tools available to you.
Jul 1, 2018   |  By AT&T Cybersecurity
With so many open source tools available to help with network security, it can be tricky to figure out where to start, especially if you are an IT generalist who has been tasked with security.

AT&T Cybersecurity has simplified the way organizations detect and respond to today’s ever evolving threat landscape. Our unique and award-winning approach, trusted by thousands of customers, combines the essential security controls of our all-in-one platform, AlienVault Unified Security Management, with the power of AlienVault’s Open Threat Exchange, the world’s largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource-constrained IT teams.

AlienVault® USM Anywhere™ accelerates and centralizes threat detection, incident response, and compliance management for your cloud, on-premises, and hybrid environments. USM Anywhere includes purpose-built cloud sensors that natively monitor your Amazon Web Services (AWS) and Microsoft Azure cloud environments, and cloud applications like Office 365. On premises, lightweight virtual sensors run on Microsoft Hyper-V and VMware ESXi to monitor your virtual private cloud and physical IT infrastructure.

With USM Anywhere, you can rapidly deploy sensors into your cloud and on-premises environments while centrally managing data collection, security analysis, and threat detection from the AlienVault Secure Cloud.