AlienVault

What is YTQ?

What is CRQC? Widespread interest in quantum computing continues to expand as computer innovators, scientists, and technology industry leaders vie to position themselves at the top of the pack for quantum computing prowess.  As the buzz continues, I’d like to discuss Cryptographically Relevant Quantum Computers (CRQC) in simple terms. A CRQC uses quantum mechanical phenomena […]

API Security in the fast lane

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Today, an important measure for success in the tech sector is time to market. The speed at which you can launch your product […]

Stories from the SOC: Fortinet authentication bypass observed in the wild

Executive summary: Fortinet’s newest vulnerability, CVE-2022-40684, allowing for authentication bypass to manipulate admin SSH keys, unauthorized downloading of configuration files, and creating of super admin accounts, has put a big target on the backs of  unpatched and exposed Fortinet devices. An AT&T Managed Extended Detection and Response (MXDR) customer was involved in a true positive […]

5 Tips for protecting your connected vehicle against Cyberattacks

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  As more connected vehicles hit the road, cyberattacks are increasing. Deloitte estimates that there will be over 470 million connected cars in use […]

10 Ways to spot a phishing attempt

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Phishing attacks are becoming more and more common, and they're only getting more sophisticated. While there are a variety of ways to defend […]

Cyberattacks could worsen the global energy crisis

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  War, economic instability, external threats, and global politics affect the energy sector of a country or region. In addition, cyberattacks on critical infrastructure […]

Stories from the SOC – Phishing for credentials

Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Extended Detection and Response customers. Executive summary Humans are considered the weakest link in cybersecurity. No matter how much a company invests in firewalls, antivirus, and other security software […]

The blockchain & data privacy (GDPR)

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Blockchain has been outlined as a digital, decentralized ledger that keeps a record of all transactions that present itself across a peer-to-peer network. […]

Employee onboarding needs to be engaging – But how can security be preserved?

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The tech professional labor market is an extremely competitive and difficult place right now. The stakes are so high that CNBC has highlighted […]

10 Cybersecurity predictions for 2023

As we head into 2023, we look back at the last year and the focus will continue to be on reducing risk exposure and resilience. Organizations are strengthening their ransomware defense, security, and privacy approach to product development, cyberattack response, supply chain risk management and operational technology (OT) security and based on working with customers […]

https://www.alienvault.com/

AlienVault simplifies the way organizations detect and respond to today’s ever evolving threat landscape. Our unique and award-winning approach, trusted by thousands of customers, combines the essential security controls of our all-in-one platform, AlienVault Unified Security Management, with the power of AlienVault’s Open Threat Exchange, the world’s largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource-constrained IT teams.
Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!