The Securities and Exchange Commission (SEC) has introduced a new rule for public companies that requires them to be more transparent about cybersecurity incidents. The new rule requires companies to disclose any material cybersecurity incidents within four business days of…
Category: Cybersecurity Insiders
Tesla data breach lawsuit and Johnson and Johnson data breach details
About three weeks ago, Tesla found itself in the throes of a data breach when two former employees allegedly exposed the company’s confidential information to external parties. In a recent development, a former Tesla staff member has initiated legal action…
Concerns Over Cyber Attacks Growing Among UK Schools
As the new term approaches, schools across the United Kingdom are grappling with a rising threat – cyberattacks. Many institutions, whether they are gearing up to open their doors or have already commenced preparations, are finding it increasingly challenging to…
How to Achieve Maximum Security in Virtualized Data Centers
Virtualized data centers have become the backbone of modern IT infrastructure, offering scalability, efficiency, and cost-effectiveness. However, as data center virtualization continues to grow, ensuring utmost security has become paramount. This article explores strategies and best practices for achieving maximum…
Navigating economic uncertainty with managed security services
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Uncertainty looms large on the horizon as businesses…
The Double-Edged Sword of AI – How Artificial Intelligence is Shaping the Future of Privacy and Personal Identity
In an era marked by rapid technological advancement, data privacy experts like Ken Cox, president of private cloud provider Hostirian, are ringing alarm bells. Our recent conversation with Ken revealed a nuanced perspective on the capabilities of generative language models…
Investing in Cybersecurity’s Future: A Conversation with Richard Seewald of Evolution Equity Partners
The cybersecurity landscape has undergone a dramatic transformation over the past few years, influenced by shifting threat vectors, technological advances, and changing market dynamics. For venture capital firms like Evolution Equity Partners, navigating these complexities is more crucial than ever.…
The cat and mouse game: Staying ahead of evolving cybersecurity threats
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Cybersecurity threats refer to malicious activities conducted over…
Is Cybersecurity as a Service (CSaaS) the answer: Move faster | Do more
Cybersecurity as a competitive advantage The economy is on the minds of business leaders. C-suites recognize survival depends upon the ability to safeguard systems and information. They must redesign for resilience, mitigate risk, strategically deploy assets and investments, and assign…
Mobile threat defense or bust
The case for unified endpoint management and mobile threat defense The evolution of endpoint management Unified endpoint management (UEM) has played a significant role over the years in enabling companies to improve the productivity and security of their corporate mobile…