All Research Sponsored By:AT&T Cybersecurity

2023 Edge Ecosystem
RESEARCH CONTENT: Wherever you are on your edge computing journey, exploring the current state of edge can offer you insights to add to your toolbox. Based on survey results from over 1,400 security practitioners, this report examines edge computing themes and highlights key takeaways. Continue on to access guidance for bolstering your edge computing strategy.
Posted: 25 Jan 2023 | Published: 25 Jan 2023

TOPICS:  .NET

How To Achieve Risk-Based Vulnerability Management
WHITE PAPER: Information overload challenges from data and threats can overwhelm cybersecurity professionals, causing many to unwisely skip vulnerability mitigation. Consequently, some organizations are operating at unacceptably high levels of risk. Read this guide to understand the framework of a modern, risk-based vulnerability management program.
Posted: 09 Apr 2021 | Published: 09 Apr 2021


The Essential Guide To Secure Web Gateway
WHITE PAPER: Download this white paper to better understand the secure web gateway and its place within your security stack.
Posted: 09 Apr 2021 | Published: 09 Apr 2021


Tightly Control And Manage Access To Applications And Services With Zero Trust
RESEARCH CONTENT: In this research report, AT&T’s Chief Security Officer (CSO) provides a unique perspective on implementing Zero Trust to control and manage access to applications and services. Read the full report to unlock this exclusive insight.
Posted: 09 Apr 2021 | Published: 01 Jun 2020

TOPICS:  Cybersecurity

How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction
WHITE PAPER: Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

TOPICS:  Risk Management

Evaluator’s Guide For Managed Detection And Response (MDR) Services
EBOOK: Managed detection and response (MDR) tools play a key role in enabling streamlined and unified security processes – however, finding the right MDR solution can be challenging. Read this MDR buyer’s guide to learn the basic MDR services, evaluation criteria, pitfalls to avoid, and more.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

TOPICS:  Cybersecurity

5g And The Journey To The Edge
ANALYST REPORT: With the many new ways to take advantage of low-latency, high-speed and reliability 5G is set to offer, how are organizations preparing cybersecurity practices, policies and procedures? The AT&T Cybersecurity Insights Report: 5G and the Journey to the Edge examines global cybersecurity data and the future of computing.
Posted: 07 Apr 2021 | Published: 07 Apr 2021


How To Continuously Improve Risk Management Within Leading Cybersecurity Programs
WHITE PAPER: In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Risk Management

Enable And Protect Your Remote Workforce
WHITE PAPER: Download this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.
Posted: 08 Feb 2021 | Published: 30 Oct 2020


The Relationship Between Security Maturity and Business Enablement
WHITE PAPER: AT&T Cybersecurity, in partnership with ESG, completed a research survey to parallel the NIST cybersecurity framework by assessing organizations’ postures across the 5 foundational cybersecurity functions from the framework: Identify, Protect, Detect, Respond, and Recover. Read on to uncover the results.
Posted: 08 Feb 2021 | Published: 20 May 2020


5 Building blocks for strengthening your IT security program
WHITE PAPER: Given how rapidly cybersecurity threats emerge and change, it can be hard to keep up. Security leaders must be ready to build security programs that will take their operations to a whole new level of risk reduction— without hampering the flexibility and recovery offered by digital transformation in a post-pandemic business world.
Posted: 08 Feb 2021 | Published: 08 May 2020


A guide to build vs. buy service models for threat detection and response
WHITE PAPER: Many important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.
Posted: 08 Feb 2021 | Published: 07 May 2020


SIEM Analyst Research Bundle
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017


PCI Compliance with Unified Security Management
WHITE PAPER: Because organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.
Posted: 19 Oct 2017 | Published: 19 Oct 2017


5 Steps to Implement & Maintain PCI DSS Compliance
WHITE PAPER: Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017


The Perfect Rx for HIPAA Compliance
WHITE PAPER: Complying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017


What You SIEM is What You Get
WHITE PAPER: A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017


Threat Intelligence Evaluator's Guide
WHITE PAPER: One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017


Security Operations Center (SOC) Essentials for the SME
WEBCAST: Watch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.
Posted: 16 Jun 2014 | Premiered: Jun 16, 2014


How to Limit the Risk of Attack on your XP Assets
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014


Unified Security Management: Real-time Threat Detection
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014


6 Steps to SIEM Success
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013


PCI DSS Simplified: What You Need to Know
WEBCAST: Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
Posted: 14 Oct 2013 | Premiered: Oct 14, 2013


AlienVault Unified Security Management: Complete Security Visibility
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013


SIEM Demo: Get Complete Security Visibility in an Hour
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013