Navigating the Cybersecurity landscape: A deep dive into effective SIEM strategies

 The content of this post is solely the responsibility of the author.  AT&T does not adopt…

Generative Ai: The Future of Cloud Security

By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation…

What’s The Role of Gaslighting in The Cyber Security Context of Social Engineering?

By Anna Drescher, Freelance Writer and Mental Health Specialist A few years ago, I received an…

‘Generative AI’s impact to affect white-collar jobs’ – ET CISO

Generative AI’s impact will strongly affect white-collar jobs, executive vice-president, chairman and managing director of Cognizant…

Adam Levin featured on Dark Rhiino’s Security Confidential Podcast

Adam Levin was a guest on Dark Rhiino’s Security Confidental podcast. In the episode, he encouraged…

Cyber threat prevention ahead of U.S. elections – CyberTalk

Mark Ostrowski is Head of Engineering, U.S. East, for Check Point, a global cyber security company.…

Bolstering IoT Cybersecurity Amid an Evolving Landscape: A CEO’s Perspective

By Ron Konezny, President & CEO, Digi International The most cybersecurity-savvy members of an organization are…

Ransomware paralyzes healthcare organizations, jeopardizing compensation – CyberTalk

EXECUTIVE SUMMARY: Across the United States, healthcare providers are struggling to process payments due to a…

Wireless Peripheral Devices – Security Risk, Exploits and Remediation

This article covers the importance of Wireless Peripheral Device Security, the risks involved, and ways to…

With The World Distracted, China Stirs Trouble in The Asia Pacific

By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction – Thrilla in Manilla President Biden warned that…

AI governance and preserving privacy

AT&T Cybersecurity featured a dynamic cyber mashup panel with Akamai, Palo Alto Networks, SentinelOne, and the…

Apple rejects AI disclosure proposal – ET CISO

Apple shareholders on Wednesday rejected a measure asking the iPhone maker to disclose more information about…

Must-know network security management insights (2024) – CyberTalk

EXECUTIVE SUMMARY:Network security management refers to the processes and systems that administrators put into place for…

Why Higher Education Is So Vulnerable to Cyber Attacks — And What to Do

By Zac Amos, Features Editor, ReHack Cyberattacks are a growing problem worldwide as they can cause…

Safeguarding Your SMB or MSP Against Deepfake Cybercrime: Insights from Hong Kong – CyberHoot

In today’s digital landscape, deepfake cybercrime presents a pressing threat demanding attention from SMBs and MSPs.…

Why Companies Are Still Investing in Tech During an Economic Slowdown

By Luke Wallace, VP of Engineering at Bottle Rocket With rising oil prices, higher interest rates,…

Get the AT&T Cybersecurity Insights Report: Focus on Energy and Utilities

We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights Report: Focus on Energy…

AT&T Cybersecurity announces 2024 ‘Partner of the Year Award’ winners

We’re pleased to announce our 2024 Partner of the Year awards. These annual awards recognize AT&T…

Bringing cybersecurity to the boardrooms of India Inc – ET CISO

Tony Buffomante, Global Head – Cybersecurity & Risk, Wipro Ltd The cybersecurity landscape has shifted greatly…

From privacy to profit: The journey of stolen data – ET CISO

Sharda Tickoo, Director Sales, Large Enterprise and Technical Leader -Trend Micro, India & SAARC In the…

Apple cancels car project, instead ramping up this initiative… – CyberTalk

EXECUTIVE SUMMARY: Apple has spent years and billions of dollars not-so-secretly preparing for the release of…