All Research Sponsored By:AT&T Cybersecurity

Is Your Business Secure Enough to Work at the Edge
WEBCAST: As the increasing adoption of hybrid work drives more organizations towards edge computing, your business may have any of the following questions: What is edge computing? What can edge computing mean for your business? And how can your business ensure strong cybersecurity in an edge environment? Unlock answers by watching this webcast.
Posted: 16 Dec 2022 | Premiered: Dec 16, 2022

TOPICS:  .NET

Rapidly evolving IoT malware EnemyBot now targeting Content Management System servers and Android devices
BLOG: Are you familiar with EnemyBot? It’s an IoT botnet thought to be distributed by the threat actor Keksec. This blog details EnemyBot’s capabilities and targets. Continue on and equip yourself with the knowledge needed to defend your organization against the attack.
Posted: 16 Dec 2022 | Published: 16 Dec 2022

TOPICS:  .NET

The evolution of Zero Trust with AT&T: the ZTNA 2.0 advantage
BLOG: ZTNA 2.0. Have you heard of it yet? This blog introduces the new security technology, which was developed with highly distributed work environments in mind. Read now to examine 5 frequently asked questions about ZTNA 2.0 and to unlock answers.
Posted: 15 Dec 2022 | Published: 15 Dec 2022

TOPICS:  .NET

Securing Your Digital Assets Today and Tomorrow
WEBCAST: If your business is moving to the edge, you know that securing your digital assets is imperative. But how can you accomplish this goal? This webcast answers that question and more. Watch now to hear from representatives from AT&T and Fortinet.
Posted: 15 Dec 2022 | Premiered: Dec 15, 2022

TOPICS:  .NET

Global Managed Detection and Response Market, 2022
RESEARCH CONTENT: Are you searching for the right managed detection and response (MDR) tool for your organization? In this report’s Frost Radar, Frost & Sullivan plot global MDR vendors according to innovation and growth. Continue on to compare vendors like AT&T and Verizon.
Posted: 13 Dec 2022 | Published: 14 Dec 2022

TOPICS:  .NET

Edging Towards SASE: Next generation networking, cloud and security
WHITE PAPER: With hybrid work reigning as the standard, it is imperative for businesses to understand an architecture that can deliver the flexibility needed to support the hybrid model: SASE (Secure Access Service Edge). What is SASE, why is it important and how can you integrate it into your networking? Find these answers in this white paper.
Posted: 13 Dec 2022 | Published: 14 Dec 2022

TOPICS:  .NET

The Forrester Wave™: Global Managed Security Services Providers, Q3 2020
ANALYST REPORT: In this Forrester Wave report, take a closer look at the managed security services market, including a comprehensive evaluation of the today’s top vendors and their offerings. Read on to unlock the full report.
Posted: 15 Apr 2021 | Published: 27 Jul 2020

TOPICS:  Cybersecurity

How To Achieve Risk-Based Vulnerability Management
WHITE PAPER: Information overload challenges from data and threats can overwhelm cybersecurity professionals, causing many to unwisely skip vulnerability mitigation. Consequently, some organizations are operating at unacceptably high levels of risk. Read this guide to understand the framework of a modern, risk-based vulnerability management program.
Posted: 09 Apr 2021 | Published: 09 Apr 2021


The Essential Guide To Secure Web Gateway
WHITE PAPER: Download this white paper to better understand the secure web gateway and its place within your security stack.
Posted: 09 Apr 2021 | Published: 09 Apr 2021


Tightly Control And Manage Access To Applications And Services With Zero Trust
RESEARCH CONTENT: In this research report, AT&T’s Chief Security Officer (CSO) provides a unique perspective on implementing Zero Trust to control and manage access to applications and services. Read the full report to unlock this exclusive insight.
Posted: 09 Apr 2021 | Published: 01 Jun 2020

TOPICS:  Cybersecurity

IDC Marketscape: Worldwide Managed Security Services 2020 Vendor Assessment
ANALYST REPORT: Download the report today to see what the IDC MarketScape had to say in their worldwide managed security services 2020 vendor assessment.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

TOPICS:  Security

How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction
WHITE PAPER: Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

TOPICS:  Risk Management

Evaluator’s Guide For Managed Detection And Response (MDR) Services
EGUIDE: Managed detection and response (MDR) tools play a key role in enabling streamlined and unified security processes – however, finding the right MDR solution can be challenging. Read this MDR buyer’s guide to learn the basic MDR services, evaluation criteria, pitfalls to avoid, and more.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

TOPICS:  Cybersecurity

5g And The Journey To The Edge
ANALYST REPORT: With the many new ways to take advantage of low-latency, high-speed and reliability 5G is set to offer, how are organizations preparing cybersecurity practices, policies and procedures? The AT&T Cybersecurity Insights Report: 5G and the Journey to the Edge examines global cybersecurity data and the future of computing.
Posted: 07 Apr 2021 | Published: 07 Apr 2021


How To Continuously Improve Risk Management Within Leading Cybersecurity Programs
WHITE PAPER: In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Risk Management

Enable And Protect Your Remote Workforce
WHITE PAPER: Download this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.
Posted: 08 Feb 2021 | Published: 30 Oct 2020


The state of SIEM
WHITE PAPER: Take a look at the state of the SIEM in 2020 and how platforms like AT&T Unified Security Management (USM) are redefining this space by going beyond simply collecting, correlating, and analyzing log data.
Posted: 08 Feb 2021 | Published: 21 May 2020


The Relationship Between Security Maturity and Business Enablement
WHITE PAPER: AT&T Cybersecurity, in partnership with ESG, completed a research survey to parallel the NIST cybersecurity framework by assessing organizations’ postures across the 5 foundational cybersecurity functions from the framework: Identify, Protect, Detect, Respond, and Recover. Read on to uncover the results.
Posted: 08 Feb 2021 | Published: 20 May 2020


5 Building blocks for strengthening your IT security program
WHITE PAPER: Given how rapidly cybersecurity threats emerge and change, it can be hard to keep up. Security leaders must be ready to build security programs that will take their operations to a whole new level of risk reduction— without hampering the flexibility and recovery offered by digital transformation in a post-pandemic business world.
Posted: 08 Feb 2021 | Published: 08 May 2020


A guide to build vs. buy service models for threat detection and response
WHITE PAPER: Many important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.
Posted: 08 Feb 2021 | Published: 07 May 2020


SIEM Analyst Research Bundle
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017


PCI Compliance with Unified Security Management
WHITE PAPER: Because organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.
Posted: 19 Oct 2017 | Published: 19 Oct 2017


5 Steps to Implement & Maintain PCI DSS Compliance
WHITE PAPER: Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017


The Perfect Rx for HIPAA Compliance
WHITE PAPER: Complying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017


What You SIEM is What You Get
WHITE PAPER: A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017