The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Environmental sustainability is more important than ever before…
Tag: Cybersecurity Insiders
Securing the smart cities of tomorrow: Cybersecurity challenges and solutions
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Smart cities are on the rise. What was…
Details of Airbus Cyber Attack and Implications
Airbus, a renowned leader in the aerospace industry, has recently found itself at the center of a highly sophisticated cyber-attack, sending shockwaves through the cybersecurity landscape. This breach has exposed a trove of sensitive information, including the personal details of…
Data Poisoning: A Growing Threat to Cybersecurity and AI Datasets
In the ever-evolving landscape of cybersecurity, threats continue to take on new forms and adapt to advanced defense mechanisms. One such emerging threat that has gained prominence in recent years is “data poisoning.” Data poisoning is a covert tactic employed…
Top 10 Programming Languages that are required in Cybersecurity Field
In the realm of cybersecurity, knowledge of programming languages empowers security professionals to decipher how hackers employ programming to breach systems. While not all cybersecurity roles require proficiency in programming, it is undeniably valuable. Mastery of programming languages equips these…
Future forward cyber
For organizations of all sizes, cyber consistently earns a place on the agenda, becoming a focal point for business-critical initiatives and investments. Today, cyber means business, and it isn’t challenging to overstate the importance of cyber as a foundational and…
Resilient networks: Building blocks of modern Cybersecurity architecture
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In today’s interconnected digital landscape, where data flows…
AT&T Cybersecurity serves as critical first responder during attack on municipality
Earlier this year, analysts in the AT&T Cybersecurity Managed Threat Detection and Response (MTDR) security operations center (SOC) were alerted to a potential ransomware attack on a large municipal customer. The attack, which was subsequently found to have been carried…
China’s Move Towards Automated Data Security Compliance
In an era marked by persistent insider threats, espionage activities, malicious software attacks, and escalating cyberwarfare, China is contemplating a gradual shift towards replacing human oversight with cutting-edge technology to enforce critical data security regulations. Under the banner of national…
WEBINAR: 5 Reasons Why Zero Trust Network Access (ZTNA) Triumphs Over VPN
Join the webinar “5 Reasons Why Zero Trust Network Access (ZTNA) Triumphs Over VPN” live on September 21 [ save your seat ]. Recent findings from the 2023 VPN Risk Report have set off alarms, with a staggering 90% of…