Is Machine Learning Part of Your Security Strategy?
BrandPost AT&T

Is Machine Learning Part of Your Security Strategy?

In the world of security perimeter defenses, more is not necessarily better. This is particularly true with threat detection, where software discovering 90 million possible threats a week is really no more helpful than one that...

05/22/18

Cloud Security Alerts: Automation Can Fill Gaps in Multi Cloud Approach
BrandPost AT&T

Cloud Security Alerts: Automation Can Fill Gaps in Multi Cloud Approach

Enterprise cloud adoption is accelerating, with most companies taking a hybrid approach that entails migrating workloads to the public cloud where possible, and keeping workloads in a private cloud where appropriate. Public cloud...

05/15/18

Securing IoT in Healthcare is Critical
BrandPost AT&T

Securing IoT in Healthcare is Critical

In 2012, a fictitious U.S. vice president on the television show “Homeland” had his pacemaker hacked. In 2013, former Vice President Dick Cheney told “60 Minutes” that after he watched the show he instructed doctors to disable the...

05/08/18

Can Shadow IT Be Good for Enterprises?
BrandPost AT&T

Can Shadow IT Be Good for Enterprises?

One of today's most enduring IT challenges is shadow IT, where business units go renegade and secure their own applications and services without involving IT, typically by leveraging cloud providers. Gartner estimates that...

05/01/18

Making Identity and Access Management Work for You
BrandPost AT&T

Making Identity and Access Management Work for You

There are many reasons why some enterprises struggle with their Identity and Access Management (IAM) strategies, but it's often not the types of authentication being explored. Too many companies still think of IAM as solely an IT...

04/24/18

IoT, Cloud, or Mobile: All Ripe for Exploit and Need Security’s Attention
BrandPost AT&T

IoT, Cloud, or Mobile: All Ripe for Exploit and Need Security’s Attention

Research on tech spending plans for the year ahead show cloud, mobile and Internet of Things security are all priorities. As these investments grow, so do concerns about cybersecurity. According to IDC, the potential cybersecurity...

04/17/18

Protecting Mobile Devices Requires Training and Technology
BrandPost AT&T

Protecting Mobile Devices Requires Training and Technology

Despite abundant evidence that attacks on mobile devices continue to increase, many companies still don’t have a mobile security strategy that combines end-user training with strong mobile content management software. This is...

04/10/18

The IoT Threat Can Be Tamed with Internal Communication
BrandPost AT&T

The IoT Threat Can Be Tamed with Internal Communication

The smart house today is chockful of Internet of Things (IoT) devices, from refrigerators and microwaves to thermostats and televisions. But what about the smart company? Enterprises have far more IoT devices than any residence,...

04/03/18

Mobile Threats Need a User-Centered Security Strategy
BrandPost AT&T

Mobile Threats Need a User-Centered Security Strategy

With smartphones and tablets in wide use by workers, companies face a growing risk: the potential loss of critical data from lost, stolen, or poorly secured mobile devices. The problem has reached a critical point as the number of...

03/22/18

The Challenge of Protecting Industrial IoT
BrandPost AT&T

The Challenge of Protecting Industrial IoT

The Industrial Internet of Things (IIoT) is a segment of IoT that demands the attention of security officers and CIOs – and with good reason. The consequences associated with cyber-attacks on water supplies and power facilities...

03/15/18

3 Must-Haves for Hybrid Cloud Security
BrandPost AT&T

3 Must-Haves for Hybrid Cloud Security

Companies across industries are rushing to move applications and workloads to hybrid cloud platforms, but many customers still don’t fully understand the security responsibilities they face as they commingle public cloud, private...

03/08/18

BrandPost AT&T

What’s Next for Cybersecurity in 2018?

What’s Next for Cybersecurity in 2018?  By Dwight Davis Is it possible to anticipate what the coming year will bring us – pro and con – on the cybersecurity front? Making precise predictions about one of the most dynamic sectors...

12/01/17

BrandPost AT&T

Yes, There's a Cybersecurity Skills Shortage

Yes, There's a Cybersecurity Skills Shortage By Charles Cooper When U.S. News and World Report reviewed the 10 best technology jobs for 2017, a career in information security analysis ranked seventh on its list. For good reason:...

11/27/17

BrandPost AT&T

5 Fundamentals in Cyber Risk Management

5 Fundamentals in Cyber Risk Management By Charles Cooper When it comes to cybersecurity, organizations face a future in which it’s best to prepare for worst-case scenarios. As the number of cyberbreaches top previous records,...

11/16/17

BrandPost AT&T

Fine-Tune Your CyberSecurity Budget for the Changing Threat Landscape

Fine-Tune Your CyberSecurity Budget for the Changing Threat Landscape By Paul Gillin It’s the middle of the intense fourth-quarter budgeting season, and CIOs are confronting the same cybersecurity questions that vex them every...

11/09/17

BrandPost AT&T

3 Tips to Reduce Cybersecurity Gaps

3 Tips to Reduce Cybersecurity Gaps By Carin Hughes Cybercriminals’ successes are escalating. Whether it’s mining new vulnerabilities or exploiting twists on tried-and-true tactics, bad actors are negatively impacting business...

11/03/17

BrandPost AT&T

Cybersecurity Budgets Across the Globe

Cybersecurity Budgets Across the Globe By Dwight Davis According to a recent AT&T-sponsored survey, the type and amount of your cybersecurity investments may be significantly influenced by the region in which your organization...

11/02/17

BrandPost AT&T

Where Emerging Cybersecurity Technology Fits in Your Business

Where Emerging Cybersecurity Technology Fits in Your Business    By Charles Cooper As 2017 enters the final stretch, security professionals still find themselves locked in a furious battle with hackers. Some 80 percent of the IT...

10/31/17

BrandPost AT&T

Do Dangerous Gaps Exist in Your Cybersecurity Investments?

Do Dangerous Gaps Exist in Your Cybersecurity Investments? By Dwight Davis Are there any companies today that don’t take cyberthreats seriously? Maybe a handful, but they are outliers in a world in which cybersecurity has become a...

10/26/17

BrandPost AT&T

What is the Cost of a Breach?

What is the Cost of a Breach? By Charles Cooper The odds that your organization will suffer a data breach are not just higher than ever. They are more expensive than ever. A recent report from Kaspersky Lab and B2B International,...

10/24/17

Load More