The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The spread of the remote workforce and the…
Category: Cybersecurity Insiders
Details of Kia Boyz breaching car security as Kia Challenge on TikTok
Over the past couple of years, a peculiar social media trend known as the Kia Challenge has gained traction on various platforms such as Facebook, Twitter, Telegram, and WhatsApp. This challenge involves a group of thieves called the Kia Boyz,…
Microsoft VMs hijacked in cloud Cyber Attack
A threat actor with a history of targeting Microsoft servers has recently gained control over virtual machines (VMs) and installed third-party remote management software within clients’ cloud environments. The Mandiant Intelligence team has identified this actor, known as UNC3844, evading…
The Vital Importance of Cybersecurity for Profit-Making Organizations
In today’s digital age, profit-making organizations across industries are increasingly reliant on technology and the internet to conduct their operations. While this technological advancement brings numerous benefits, it also exposes businesses to various cybersecurity risks. Protecting sensitive data, customer information,…
Beware of ChatGPT and Midjourney imposters
To all those who are eagerly searching for ChatGPT login and Midjourney web pages, here’s an alert that needs your immediate attention. A threat actor named BatLoader has started a campaign of hosting fake ChatGPT and Midjourney webpages on Google…
OpenAI CEO concerned that ChatGPT could compromise US elections 2024
OpenAI CEO Sam Altman has expressed his concerns to the Senate that the use of AI without any limitations is a big cause for concern regarding the integrity of election processing to be held in November 2024. ChatGPT is turning…
Happy Mother’s Day! Serving, surviving, and thriving as a mom with a cyber career
Being a mother and working in cybersecurity necessitates unique skillsets. As mothers, we understand time management, communication, and positive reinforcement. We emphasize the value of clear instructions and providing positive reinforcement. Mothers possess the capacity to remain calm and composed…
Scans required for PCI DSS compliance
This is the fifth blog in the series focused on PCI DSS, written by an AT&T Cybersecurity consultant. See the first blog relating to IAM and PCI DSS here. See the second blog on PCI DSS reporting details to ensure when…
The Top 4 Ransomware Vulnerabilities Putting your Company in Danger
By Aaron Sandeen, CEO and co-founder at Securin In 2023, you can divide organizations into two categories: those who have been hit by a ransomware attack and those who will be soon. Ransomware is ubiquitous, inescapable, and—despite widespread efforts to…
Navigating the complex world of Cybersecurity compliance
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Cyberattacks have become increasingly common, with organizations of…
Preventing sophisticated phishing attacks aimed at employees
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. As technology advances, phishing attempts are becoming more…
Russian scientists develop new communication medium through quantum teleportation
Scientists from Russia, working for Don State Technical University, have developed a new medium of communication through the technology of Quantum Teleportation. The researchers argue that the invention will play a vital role in protecting information from being stolen by…
Architecture Matters When it Comes to SSE
by John Spiegel, Director of Strategy, Axis Security Gartner just released the 2023 version of their “Magic Quadrant” for Secure Service Edge or SSE. Cheers are being heard from the companies who scored upper righthand and jeers being shouted for…
Understanding Cyber Risk and the C-Suite
by J2 Software CEO John Mc Loughlin The threat landscape for businesses has evolved significantly in recent years, with cyberattacks becoming more sophisticated and frequent. As a result, cybersecurity has become a top priority for organisations of all sizes, and…
Technology based acquisition news trending on Google
IBM has made a smart move to address the issue of cloud data protection by acquiring Polar Security, a company specializing in automated data protection. The tech giant has officially announced that this new acquisition will assist companies in tackling…
The Transformative Power of Artificial Intelligence Across Industries
The pervasive influence of Artificial Intelligence (AI) is propelling a remarkable wave of transformation across diverse sectors. As AI technologies become increasingly integrated, industries are witnessing unprecedented changes that enhance productivity, streamline operations, and optimize decision-making processes. The growing adoption…
Encrypting files and emails: A beginner’s guide to securing sensitive information
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In today’s digital age, sensitive information is constantly…
Google AI powered driverless vehicles making San Francisco a testing ground
If you browse online news sources covering San Francisco, it’s evident that there is a recurring theme of articles highlighting accidents involving driverless vehicles. These incidents range from head-on collisions with buses to disregarding warning signs and driving into power…
Ransomware News Headlines Trending on Google
A new ransomware group dubbed RA Group has been hitting the news headlines for the past two weeks. The group is targeting organizations operating in the United States and South Korea. Currently, it appears that the attackers are primarily focusing…
CISOs: How to improve cybersecurity in an ever-changing threat landscape
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The digital landscape is always changing to keep…
Philadelphia Inquirer possibly hit by ransomware attack
Daily news paper ‘The Philadelphia Inquirer’ has been apparently hit by a cyber attack of ran-somware attack and it is unclear when the systems are likely to be restored. As of now, the IT staff of the news publisher based…
Ghanian children involved in Britain Catfishing Romance Scams
In January of this year, the UK police disclosed that some schools in Ghana were teaching school kids above the age of 10 to catfish single women from Britain and engage in romance scams with them, exploiting them for money…
How is information stored in cloud secure from hacks
The rise of cloud computing has provided individuals and businesses with a convenient way to store and access their data. However, with this convenience comes a concern about data security. Cloud storage services have become a target for hackers, and…
The role of AI in healthcare: Revolutionizing the healthcare industry
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Introduction Artificial Intelligence (AI) is the mimicry of…
How Compliance Automation Can Transform Your Next Audit
Automation transforms the audit experience. What was once a burden to bear becomes a competitive advantage that lets your company maximize every opportunity. Streamlining the audit process is not the only benefit compliance automation. From higher productivity to stronger security…
How to avoid mothers day scams
Coming May 14th, 2023, most of the world will be celebrating Mother’s Day for this year. So, obviously many of the daughters and sons will be shopping to gift for their loved ones and this is where scammers will be…
Black Basta Ransomware attack on ABB Group LTD
ABB Group that is into the business field of offering Automation Technology was reportedly hit by Black Basta Ransomware attack. The Swiss based multinational company said that the attack hits its business operations and has been contained. However, some of…
Cyber Security vs Data Science: Which is best pay wise
With the increasing use of technology, the demand for professionals with expertise in Cyber Security and Data Science has also been on the rise. Both fields are known to have good career prospects and lucrative salaries. However, when it comes…
OneNote documents have emerged as a new malware infection vector
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Intro In February 2022, Microsoft disabled VBA macros…
Preventing sophisticated phishing attacks aimed at employees
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. As technology advances, phishing attempts are becoming more…
Application Programming Interface (API) testing for PCI DSS compliance
This is the fourth blog in the series focused on PCI DSS, written by an AT&T Cybersecurity consultant. See the first blog relating to IAM and PCI DSS here. See the second blog on PCI DSS reporting details to ensure when…
Cyber Attack on Tokyo MoU compromises data
Tokyo MoU, the most active regional port control organization in the Asia Pacific, has revealed that its data was compromised for months and that hackers gained fraudulent access through a cyber attack. It is unclear how the attack has impacted…
Prince Harry spills beans on Daily Mirror Phone Hacking story
While the world media was busy covering the Coronation ceremony of the Royal King Charles III of Britain, a separate story was circulating online regarding the phone hacking of Prince Harry. According to a statement released by the prince, a…
The impact of blockchain technology on the future of finance
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The future of finance is being reshaped by…
Improving your bottom line with cybersecurity top of mind
In times of economic downturn, companies may become reactive in their approach to cybersecurity management, prioritizing staying afloat over investing in proactive cybersecurity measures. However, it’s essential to recognize that cybersecurity is a valuable investment in your company’s security and…
Advice for the Graduating Class of 2023: Qualities of a Modern Day Cybersecurity Professional
By Andy Skrei, Sr. Director of Product Management, Exabeam A recent survey from the World Economic Forum found that 59% of organizations would have difficulty responding to a cyberincident due to shortage of skills. The cybersecurity workforce gap also increased…
Signed, Secured, Delivered: Authenticating Digital Agreements in the Time of Web3
By Sameer Hajarnis, CPO, OneSpan With the digital economy flourishing, both organizations and consumers are becoming more comfortable making high-value transactions online. To keep up with Web3, organizations have had to offer flexible, digital alternatives to their business processes. Among…
RSAC 2023 | Cybersecurity research on edge computing generates big interest
RSAC 2023 was a huge success. We launched our 2023 AT&T Cybersecurity Insights Report, which was met with enthusiasm by the industry and the media. In fact, Will Townsend, writing for Forbes, noted that our report joined other great research…
Looking at a penetration test through the eyes of a target
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Analyzing an organization’s security posture through the prism…
News on WhatsApp listening to sleeping users and Doctors fraternity raising voice against AI threat to humanity
Elon Musk issued a statement recently slamming WhatsApp for secretly recording activities while the user is sleeping. On Tuesday, the Tesla Chief raised concerns that “WhatsApp cannot be trusted” when it comes to keeping its user data private and secure…
Australia TechnologyOne hit by a Cyber Attack
TechnologyOne, the Australia-based trading firm, has issued a statement stating that some of its systems were targeted by a cyber attack, as a result of which it halted the entire trading process, impacting millions of customers. Unconfirmed sources state that…
How do password managers make sense
In today’s digital age, managing passwords has become increasingly complex. With the average internet user having more than 100 passwords to remember, it’s no wonder that people often resort to using weak passwords that are easy to remember or reuse…
The CPRA compliance checklist every business should follow in 2023
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The California Privacy Rights Act (CPRA) was passed…
Securing the Edge Ecosystem Global Research released – Complimentary report available
AT&T Cybersecurity is committed to providing thought leadership to help you strategically plan for an evolving cybersecurity landscape. Our 2023 AT&T Cybersecurity Insights™ Report: Edge Ecosystem is now available. It describes the common characteristics of an edge computing environment, the…
Scans required for PCI DSS compliance
This is the fifth blog in the series focused on PCI DSS, written by an AT&T Cybersecurity consultant. See the first blog relating to IAM and PCI DSS here. See the second blog on PCI DSS reporting details to ensure when…
The role of AI in healthcare: Revolutionizing the healthcare industry
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Introduction Artificial Intelligence (AI) is the mimicry of…
Microsoft new ChatGPT to address all privacy concerns
Microsoft is now an undoubted owner of the AI conversational tool ChatGPT developed by OpenAI. It was released in November last year and since then has faced backlash from a small sect of technology enthusiasts regarding privacy concerns. The Windows…
Jobs that will be lost for sure with adoption of Artificial Intelligence Technology
Tesla CEO Elon Musk has predicted that computers and intelligent machines will eventually replace manual labor, resulting in humans losing their jobs to AI technology. While adopting automation and AI can boost productivity and economic growth, it will also result…
Get ready for RSA 2023: Stronger Together
Going to RSA next week? If you don’t know, it’s a huge cybersecurity conference held at Moscone Center in San Francisco, CA. If you’re going, please stop by the AT&T Cybersecurity booth and check us out. It’s at #6245 in…
Lessons From the Fortune 100 About Cloud-Native Application Security
By Ratan Tipirneni, President and CEO, Tigera While cloud-native technologies are relatively new to many businesses, Global 2,000 companies have run containers and distributed applications at scale for over a decade. Although these household-name companies are high-profile targets for hackers, they…
Firing the Vulnerability Disclosure Fire-Drill Mentality
Omer Carmi, VP of Threat Intelligence, Cybersixgill When I was in elementary school, we had a routine fire drill. The alarm bells would ring, and we were expected to drop everything and run outside as quickly as possible. As a…
Preventing sophisticated phishing attacks aimed at employees
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. As technology advances, phishing attempts are becoming more…
One Password can cause huge damage to reputation of an Individual and Company
According to an expert from ESET, a single password can cause more damage than expected. Security specialist Jake Moore suggests that cyber criminals can easily steal data if they gain access to a password related to an email account. As…
Empire of Hackers launched by CIA targets China
It is concerning to hear about the allegations and warnings issued by China’s National Computer Virus Emergency Response Centre (CVERC) regarding the CIA’s involvement in cyber-attacks on critical infrastructure and the use of the “Empire of Hackers” group for orchestrating…
How 5G network is immune to Cyber Attacks
It is not accurate to say that 5G networks are completely immune to cyber attacks. Like any other network, 5G networks are vulnerable to various types of cyber attacks, such as distributed denial-of-service (DDoS) attacks, phishing attacks, and malware infections.…
The Rise in SBOM Adoption and How They Can Effectively Improve Software Supply Chain Security Programs
By Doug Dooley, COO, Data Theorem The software supply chain has become increasingly complex and dynamic with the rise of cloud computing, open-source software, and third-party software components and APIs. Widespread damage can occur for organizations if third-party APIs, cloud…
CSO sentenced to 3 years imprisonment for Uber Data Breach cover up
Joe Sullivan, the former Chief Security Officer (CSO) of Uber, has been sentenced to three years’ imprisonment and 200 hours of community service for covering up a cyber attack on the company’s servers in 2016, which led to a data…
Application Programming Interface (API) testing for PCI DSS compliance
This is the fourth blog in the series focused on PCI DSS, written by an AT&T Cybersecurity consultant. See the first blog relating to IAM and PCI DSS here. See the second blog on PCI DSS reporting details to ensure when…
Information Security News headlines trending on Google
First is regarding a ‘Rapid Security Update’ that is being issued by Apple Inc to all iOS devices and applies to iPads and macOS. The technology giant confirmed that the update is a necessity and can be automatically updated as…
10 Effective Ways to Protect Your Privacy Online
The internet has transformed our lives in many positive ways, but it has also created a new set of challenges, such as the need to protect our privacy online. With so much personal infor-mation available on the internet, it is…
Guidance on network and data flow diagrams for PCI DSS compliance
This is the third blog in the series focused on PCI DSS, written by an AT&T Cybersecurity consultant. See the first blog relating to IAM and PCI DSS here. See the second blog on PCI DSS reporting details to ensure when…
The impact of blockchain technology on the future of finance
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The future of finance is being reshaped by…
Facebook Meta uncovers Social Media Espionage
Meta, the parent company of Facebook, has uncovered a new social media espionage campaign in which cyber criminals launch social engineering attacks on Facebook and Instagram users by asking them to click on malevolent links, download malware, or share personal…
Godfather of AI quits Google to save the world
Geoffrey Hinton, who is known to the world as Godfather of AI has made an official an-nouncement that he will quit his position at Google for the betterment of humans from the de-velopments of the technology. Mr. Hinton released a…
Cyber Attack on Sweden Parliament just before Ukraine drone attack on Moscow Kremlin
Reports indicate that a distributed denial-of-service attack (DDoS) was launched on the IT infrastructure of the Swedish parliament, disrupting its website services to a significant extent. However, the IT teams were quick enough to digitally recover the website, which now…
Improving your bottom line with cybersecurity top of mind
In times of economic downturn, companies may become reactive in their approach to cybersecurity management, prioritizing staying afloat over investing in proactive cybersecurity measures. However, it’s essential to recognize that cybersecurity is a valuable investment in your company’s security and…
Secure SD-WAN Solution for Communication over Satellite and Networks in Adverse and DDIL Conditions
By Chitresh Yadav, Versa Networks Global Head of Sales Engineering; and Gerardo Melesio, Versa Networks Senior Solutions Architect Satellite networking is a great asset for many use cases. For example, it is critical in building a reliable global network that…
Why Observability Alone Is Not Enough to Keep Your Organization Safe
Author: Venkat Thummisi, Co-Founder & CTO – Inside Out Defense Cybersecurity teams are only as successful as their ability to observe what’s happening inside the complicated computer networks they guard. Gartner expects that by 2026, 70 percent of organizations successfully…
Looking at a penetration test through the eyes of a target
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Analyzing an organization’s security posture through the prism…
How to establish network security for your hybrid workplace
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The global COVID-19 pandemic has left lasting effects…
Today’s CISO Insights – How to Tackle the Quantum Threat
By: Craig Debban, Chief Information Security Officer, QuSecure, Inc. As you may have noticed, daily headlines around quantum computing and its impact on technologies are becoming commonplace. This is driven by the fact that quantum computers will be able to perform certain types…
Insider Risk: Unconventional Thoughts and Lessons Learned
By: Daron Hartvigsen, Managing Director, StoneTurn and Luke Tenery, Partner, StoneTurn When insider threat or insider risk is discussed in a corporate context, often the relevant topics include misconduct, fraud, misuse, or even the idea that insiders can be unwitting…
FBI seizes 9 cryptocurrency exchange websites supporting cyber criminals and ransomware spread
FBI officials have released an official statement that they have seized the servers operating in United States, Ukraine and France linked to about 9 cryptocurrency exchange websites that supported cyber criminals in their actions by indulging in money laundering and…
Who are Cyber Swindlers
Cyber swindlers, also known as cyber fraudsters, are individuals or groups who use the internet and technology to commit fraud or deception for financial gain. They use various methods, such as phishing scams, identity theft, credit card fraud, and other…
Securing the Edge Ecosystem Global Research released – Complimentary report available
AT&T Cybersecurity is committed to providing thought leadership to help you strategically plan for an evolving cybersecurity landscape. Our 2023 AT&T Cybersecurity Insights™ Report: Edge Ecosystem is now available. It describes the common characteristics of an edge computing environment, the…
The Evolution of Data Security Solutions
By Dan Benjamin, Co-Founder and CEO, Dig Security Approximately 60% of corporate data now lives in the cloud, a number that has doubled over the last seven years. While the concept of cloud computing dates back decades, it is only…
The CPRA compliance checklist every business should follow in 2023
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The California Privacy Rights Act (CPRA) was passed…
BlackCat Ransomware group breaches Australia HWL Ebsworth law firm servers
Australia’s HWL Ebsworth law firm has issued a statement stating that its servers have been hacked and the personal data of its clients and some employees were accessed and siphoned by criminals. The Blackcat ransomware gang posted a statement on…
Data Breach lawsuits against companies increasing in the year 2023
Companies that fail to protect their customers’ information are likely to face lawsuits in the year 2023, as impacted customers are no longer willing to tolerate such acts at the expense of their privacy and financial losses. This legal turn…
The role of AI in healthcare: Revolutionizing the healthcare industry
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Introduction Artificial Intelligence (AI) is the mimicry of…
API Security Takes Center Stage: Key Insights from RSA 2023
The RSA Conference 2023 witnessed a surge of interest in API security, with experts and industry leaders focusing on the increasing need to secure APIs and address vulnerabilities. As APIs continue to play a crucial role in connecting applications and…
Cyberpress Launches Cybersecurity Press Release Distribution Platform
Dubai / May 1st 2023 / Cyberpress — Cybersecurity gets a new dedicated newswire. Cyberpress, a press release distribution platform for the cybersecurity industry, has opened its doors today. This newswire service provides an effective communications approach for cybersecurity companies,…
UK gun owners at risk after Cyber Attack leads to data breach
National Crime Agency (NCA) has started a detailed investigation into a cyber attack that took place on the servers of the National Smallbore Rifle Association (NSRA) members. This attack has led to concerns that they or their family members could…
China has 50 hackers against each FBI Cyber Warrior
The FBI Director disclosed to the Congressional Committee that China has assigned around 50 hackers against each bureau’s Cyber Warriors, thus opening-up about the threats it was facing from the adversary. Christopher Wray, the director of the FBI, spoke to…
How social engineering is related to Cybersecurity
Social engineering is a term used to describe the manipulation of people into revealing sensitive information or performing actions that they otherwise wouldn’t. It is an ever-increasing threat to cybersecurity, as it can be used to gain unauthorized access to…
Google bans 173,000 malicious app developers
Google has issued a ban on approximately 173,000 application developers who tried various methods to get their software published on its Play Store. The web search giant has officially confirmed that it has weeded out a large number of bad…
Is mood tracking feature in Apple iOS 17 a privacy concern
Apple Inc’s released products are known for their progressive innovation, and the best example to prove it is the invention of a glass-driven touch screen that was first introduced to the world via the first iPhone in-series and is now…
It is illegal to use undetectable spying devices on partners
Using undetectable spying devices on partners can be illegal, and it can lead to serious legal consequences. In many countries, it is considered a criminal offense, and individuals can face legal charges for such actions. The use of undetectable spying…
Get ready for RSA 2023: Stronger Together
Going to RSA next week? If you don’t know, it’s a huge cybersecurity conference held at Moscone Center in San Francisco, CA. If you’re going, please stop by the AT&T Cybersecurity booth and check us out. It’s at #6245 in…
PCI DSS reporting details to ensure when contracting quarterly CDE tests
This is the second blog in the series focused on PCI DSS, written by an AT&T Cybersecurity consultant. See the first blog relating to IAM and PCI DSS here. There are several issues implied in the PCI DSS Standard and…
Intel allows Google to hack its servers
Intel gave permission to Google to hack its servers operating on its new security hardware product dubbed “Trust Domain Extensions” (TDX). According to sources reporting to our cybersecurity insiders, permission to infiltrate its servers was given almost 10 months ago…
LockBit Ransomware Group feels ashamed for the Cyber Attack
LockBit ransomware group that infiltrated the Olympia Community Unit School District 16 a few days ago has issued an unconditional apology for hacking into the servers of innocent school children. The criminal gang also admitted that it feels ashamed of…
Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?
Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo eum quibusdam…
The Cybersecurity Talent Gap – Where do We Go from Here?
By Tanya Freedland, VP of Human Resources and Talent Acquisition, Identiv Currently there are 1 million cybersecurity workers in the U.S., yet there are still upwards of 700,000 positions in the field that need to be filled immediately. As the…
Application Programming Interface (API) testing for PCI DSS compliance
This is the fourth blog in the series focused on PCI DSS, written by an AT&T Cybersecurity consultant. See the first blog relating to IAM and PCI DSS here. See the second blog on PCI DSS reporting details to ensure when…
F-Secure to acquire Lookout Mobile Security
F-Secure has made an official announcement that it is going to acquire the mobile security business of Lookout, and the deal might be completed by June of this year. Although the financial terms are yet to be disclosed on an…
Quad nations unite to fight Cyber Attacks on Critical Public Infrastructure
The Quad nations comprising India, Japan, Australia, and the United States will reach an agreement on how to create a collective approach to blocking cyber attacks on critical public infrastructure, such as the power and communication sectors. The Quad countries…
Is the fear of AI being overblown
Artificial intelligence (AI) is a buzzword that has gained significant traction over the past decade. Many experts predict that AI will transform industries and change the way we live and work. However, there is also a growing fear that AI…
Guidance on network and data flow diagrams for PCI DSS compliance
This is the third blog in the series focused on PCI DSS, written by an AT&T Cybersecurity consultant. See the first blog relating to IAM and PCI DSS here. See the second blog on PCI DSS reporting details to ensure when…
Improving your bottom line with cybersecurity top of mind
In times of economic downturn, companies may become reactive in their approach to cybersecurity management, prioritizing staying afloat over investing in proactive cybersecurity measures. However, it’s essential to recognize that cybersecurity is a valuable investment in your company’s security and…