News

AT&T Business

Charting a new course: When investing more in cybersecurity isn’t the answer

In the summer of 2018, AT&T Business and Spiceworks performed a research study with 250 IT leaders. The research revealed that 99% of organizations have a security risk management strategy. However, there is a sharp performance divide between the organizations confident in their risk management strategies (42% called the “Confident Investors”) and organizations who are not (57% called the “Unconfident Investors”).
Certifications A Part Of ‘Vicious Circle’ In Cyber Security Space?
CSHub

Certifications A Part Of ‘Vicious Circle’ In Cyber Security Space?

Amid a talent crisis, the cyber security space is relying on grassroots efforts to build awareness, but also on security certifications. How valuable are they for enterprise teams? We investigate.
Cybersecurity Briefing for Senior Executives With Kayne McGladrey
#AskTheCEO

Cybersecurity Briefing for Senior Executives With Kayne McGladrey

Kayne McGladrey is an Award-winning Business Driver, Account Hunter and Servant Leader who's led a very successful career in professional services and high-tech environments. Previously, he held lead
AI in cybersecurity: what works and what doesn’t
CSO Online

AI in cybersecurity: what works and what doesn’t

Much of what we hear about artificial intelligence and machine learning in security products is steeped in marketing, making it hard to know what these tools actually do. Here's a clear-eyed look at the current state of AI & ML in security.
FBI warns of ‘devastating’ cyber attacks on IoT networks
TelecomTV

FBI warns of ‘devastating’ cyber attacks on IoT networks

G-men taking threats very seriouslyRisk of devastating attacks growingIoT devices and networks inherently insecure. Still no ratified and properly effective stan…
Budgetary Foresight: 3 Essential Cyber Security Programs For 2019
CSHub

Budgetary Foresight: 3 Essential Cyber Security Programs For 2019

Be ready for 2019 budgetary questions and planning by starting early and investigating essential cyber security technologies, instead of a panicked, late-night whirlwind of RFPs and industry reports. Here's a three-part system.
3 Tips To Thwart Insider Attacks: An Essential Guide For Summer Travels
CSHub

3 Tips To Thwart Insider Attacks: An Essential Guide For Summer Travels

While remote access is not a new behavior, organizations should consider whether they can distinguish between a legitimate user on holiday compared to a threat actor with stolen credentials. Here are some tips.
Passwords, Multi-Factor Authentication and Cybersecurity
IEEE Transmitter

Passwords, Multi-Factor Authentication and Cybersecurity

When the word “cybersecurity” comes up, “password” is often not far behind. You’ve doubtlessly heard that people are rather bad at [...]
Health IT Infrastructure Necessities for AI Cybersecurity
CIO Review

Health IT Infrastructure Necessities for AI Cybersecurity

With Artificial Intelligence (AI) and Machine Learning (ML) becoming extremely popular across various industries, healthcare...
Two Easy Steps To Reduce And Detect Threats In A Cloud Environment
CSHub

Two Easy Steps To Reduce And Detect Threats In A Cloud Environment

Organizations can take simple steps to secure their cloud services and begin to detect and isolate threats. Here's a two-step system that could benefit your enterprise.
The Future is Now: Podcast

Interview with Kayne McGladrey

Why AI Could be Cybersecurity’s Next Big Thing
IEEE Transmitter

Why AI Could be Cybersecurity’s Next Big Thing

Though it’d be convenient, the fact that more and more organizations have dealt with cyberattacks doesn’t mean that similar attacks [...]
eSecurity Planet

AI’s Future Role in Cybersecurity

Industry experts from Coalfire, IEEE and more discuss how AI is shaping the future of IT security.
Are You Doing All You Can to Protect Your Confidential Documents?
CSO Online

Are You Doing All You Can to Protect Your Confidential Documents?

That’s the question we posed to members of the IDG Influencer Network. Their consensus: secure printing is more critical now than ever before.
Artificial Intelligence: Testing automated customer service for travelers
USA Today

Artificial Intelligence: Testing automated customer service for travelers

These early days of travel bots that specialize in customer service, chat, messaging and search are a cautionary tale.
The Scary Reason Companies Like Verizon Keep Blowing Your Digital Privacy
Fast Company

The Scary Reason Companies Like Verizon Keep Blowing Your Digital Privacy

It wasn't a hacker who exposed the personal info of millions of Verizon customers—it was human error. Cloud storage is raising new digital security challenges.
Understanding Cybersecurity Breaches at Consulting Firms
IEEE Transmitter

Understanding Cybersecurity Breaches at Consulting Firms

Cybersecurity threats are affecting consulting and professional service firms causing substantial losses. Kayne McGladrey [...]
Setting The Four Cornerstones Of Cloud Security: Accountability, Strategy, Visibility & Enablement
CSHub

Setting The Four Cornerstones Of Cloud Security: Accountability, Strategy, Visibility & Enablement

Cloud migration led to cloud evolution which has led to a cloud-first mindset. With a pandemic push, global corporate enterprise has gravitated to the exponential perimeter. The four cornerstones of cloud security now must be realized.