| Date | Title | Description |
| 17.03.2025 | Announcing the first close of Adara Ventures Fund 4 | We are thrilled to announce the successful first close of Adara Ventures’ fourth flagship fund, AV4, with a target of €100 million in capital commitments. This milestone reinforces our commitment to delivering strong returns in high-impact ... |
| 11.12.2024 | Kfund PodKast Recap: 20 years of Adara Ventures | Our Founding Partners, Nico Goulet and Alberto Gomez, recently sat down with Pablo Ventura and Jaime Novoa at Kfund for an in-depth conversation on their 20-year journey building Adara Ventures.
In this episode, they share valuable insights... |
| 07.08.2024 | CISOs don't feel supported at board level | While CISOs are often responsible for technology implementation, they are not getting the support they need at a strategic level according to a new report.
The study from LevelBlue looks at the dynamics among enterprise C-suite executives t... |
| 07.05.2024 | Complexity leads to trade-off between risk and innovation | A new report finds that 85 percent of executives surveyed believe computing innovation is
increasing risk.
The report from LevelBlue also shows 74 percent think the opportunity of computing innovation outweighs the corresponding increase in... |
| 10.04.2024 | The 2023 State of Inclusion Benchmark in Cybersecurity Report Reveals Women Face 2X More Exclusion than Men in the Workplace | Women in CyberSecurity (WiCyS)
New study offers an in-depth look at the experiences of women in cybersecurity and highlights areas for industry-wide improvement.
COOKEVILLE, Tenn., April 10, 2024 /PRNewswire-PRWeb/ -- Women in CyberSecurity... |
| 26.03.2024 | WiCyS and ISC2 Launch Spring Camp for Cybersecurity Certification | WiCyS + ISC2 Certified in CybersecuritySM Certification Spring Camp
In partnership with ISC2, the world's leading nonprofit member organization for cybersecurity professionals, Women in CyberSecurity (WiCyS), the nonprofit organization dedi... |
| 31.01.2024 | DarkGate Malware: Attackers Send Over 1,000 Microsoft Teams Group Chats Invites to Infect Systems | Joseph Henry, Tech Times 31 January 2024, 01:01 pm |
| 28.09.2023 | От упрощённых методов разработки до операций по удалению: как меняются ботнеты и методы борьбы с ними | Ранее мы уже рассказывали о том, как эволюционирует поведение злоумышленников, и что им пытаются противопоставить специалисты по информационной безопасности. За прошедшие полгода ситуация с DDoS-угрозами и ботнетами продолжает развитие: угр... |
| 24.09.2023 | Ransomware Negotiation and Ethics: Navigating the Moral Dilemma | Ransomware attacks have developed in recent years from mere data breaches to sophisticated operations. These attacks often involve targeting organizations, and these cyber criminals have gone from a minor speck on the digital security radar... |
| 18.08.2023 | Looking over the edge -- how edge computing will impact business decisions [Q&A] | Earlier this year, AT&T's Cybersecurity Insights Report found that business and technology leaders are finally coming together not just to understand the new edge computing ecosystem, but to make more predictable, data-informed business... |
| 28.04.2023 | RSA Conference 2023 Ushers In The Age Of Artificial Intelligence | RSA Conference |
| 24.04.2023 | Business and tech leaders collaborate to exploit the edge | Business and technology leaders are finally coming together not just to understand the new edge computing ecosystem, but to make more predictable, data-informed business decisions.
A new report from AT&T Cybersecurity finds that collabo... |
| 17.03.2023 | How security access service edge (SASE) can improve performance and security for hybrid workforces | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Today’s business environments are more sprawled than ever — users are accessing networks from poin... |
| 16.02.2023 | Benchmarking your cybersecurity budget in 2023 | Knowing which areas to focus on in a cybersecurity budget to drive the most significant business value is a must-have skill for CISOs.
Deloitte recently found that cybersecurity is core to cloud-based digital transformation, accounting for ... |
| 03.10.2022 | Vulnerability management in 2023: Questions and answers | In this article, I will try to answer several important questions related to identifying, classifying, prioritizing, and eliminating vulnerabilities in a timely manner, as well as how to automate the vulnerability management process.
Let me... |
| 09.09.2022 | New Linux malware combines unusual stealth with a full suite of capabilities | Enlarge
Getty Images reader comments 51 with 37 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
Researchers this week unveiled a new strain of Linux malware that's notable for its stealth and sophis... |
| 09.09.2022 | AT&T outs new 'Shikitega' Linux malware | Researchers at AT&T Cybersecurity say they have found new malware that attacks networked hosts and IoT devices that run Linux-based operating systems.
AT&T has named the malware "Shikitega" after finding that it uses the S... |
| 28.07.2022 | How edge computing is accelerating innovation across hardware, software and service provider domains | Join executives from July 26-28 for Transform's AI & Edge Week. Hear from top leaders discuss topics surrounding AL/ML technology, conversational AI, IVA, NLP, Edge, and more. Reserve your free pass now!
An increasing number of enterpri... |
| 31.05.2022 | VMware, F5, Log4j added to EnemyBot attack targets | AT&T is warning of expansions to the EnemyBot malware botnet that target recently-discovered vulnerabilities in F5 hardware and VMware software.
Discovered by Secronix in March, EnemyBot’s original target was the wide range of Linux var... |
| 30.05.2022 | IoT malware EnemyBot abuses critical VMware, F5 BIG-IP flaws | Securonix researchers first uncovered EnemyBot, a malware strain targeting the internet of things (IoT), in March 2022. They and other researchers believe it to be distributed by the threat actor 'Keksec' - also known as Kek Security, Necro... |
| 16.04.2022 | Best SIEM tools 2022: Compare Security Information & Event Management software | Image: chombosan, Getty Images/iStockphoto What is SIEM?
Security information and event management refers to a device and environmental analysis strategy that is intended to help secure and protect company operations, data and personnel. By... |
| 24.02.2022 | AT&T Cybersecurity Selects Binary Defense as its 2021 North American Partner of the Year | CLEVELAND (PRWEB) February 24, 2022
Binary Defense, a leading managed security services provider was selected by AT&T Cybersecurity as its 2021 North American Partner of the Year. This is the fourth award Binary Defense has received fro... |
| 04.02.2022 | Seeing The Unseen: The Core Merit Of Continuous Security Validation | Co-Founder & CTO of Cymulate. Previously, Avihai was the Head of the Cyber Research Team at Avnet Cyber & Information Security. |
| 02.02.2022 | Report: 75% of security leaders seek to implement edge use cases | Join today's leading executives online at the Data Summit on March 9th. Register here.
According to a new report by AT&T Cybersecurity, 75% of security leaders are either planning, have partially implemented, or have fully implemented a... |
| 02.02.2022 | Report: 75% of security leaders seek to implement edge use cases | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
According to a new report by AT&T Cybersecuri... |
| 25.01.2022 | Moving to the edge needs a rethink of security | In order to provide real-time services to the user, enhance data management and support latency-critical applications, many businesses are moving computing to the edge.
But this brings with it new issues when it comes to securing systems. T... |
| 21.01.2022 | Cybersecurity in 2022 – A Fresh Look at Some Very Alarming Stats | 2022 Text with binary codegetty |
| 27.12.2021 | Market opportunities, security challenges and the edge -- 5G predictions for 2022 | Although 5G technology isn't yet available to everyone, the rollout continues and as it does businesses need to recognize the challenges and opportunities that it brings.
Here are some industry expert views on what we can expect from 5G in ... |
| 24.12.2021 | Insider threats, supply chain attacks and quantum threats -- enterprise security predictions for 2022 | The transition to remote and hybrid working has led enterprises to radically revise the way they operate. This has thrown up a variety of new challenges in ensuring systems remain secure.
Industry experts give us their views on what securit... |
| 16.12.2021 | Smart and Secure: AT&T's Focus on Manufacturing | The manufacturing industry is ripe for digital transformation. Over the past 18 months, manufacturers have had to assess and reassess their operating models, processes and more-just to maintain productivity. These challenges have evolved in... |
| 01.12.2021 | Golang-дайджест № 11 (1 – 30 ноября 2021) | Свежая подборка новостей и материаловИнтересное в этом выпуске
Выпущены Go 1.17.3 и Go 1.16.10
12 лет Golang
Как насчет того, чтобы объединить Go & Ruby?
Вредоносное ПО на Golang
Парсер математических выражений
Сarotid Artillery 2D игра... |
| 18.11.2021 | Neovera Expands Relationship With AT&T Cybersecurity for Innovative Solutions That Mitigate Risk of Cybersecurity Threat | By combining Neovera’s security expertise and AT&T cybersecurity’s technology we can offer a comprehensive security solution at a tremendous value to our clients. Our Security Monitoring Services will be able to utilize AT&T Cyberse... |
| 16.11.2021 | New malware could affect millions of routers and IoT devices | Prasid Banerjee 16 Nov, 2021
The cybersecurity arm of America AT&T, called the AT&T Alien Labs, has found a new malware that’s designed to affect Internet of Things (IoT) hardware. The malware is written using Google’s open-source p... |
| 15.11.2021 | Security Week 46: новая уязвимость в Exchange Server | На прошлой неделе, 9 ноября, компания Microsoft выпустила очередной набор патчей для собственных продуктов. Он закрывает 55 уязвимостей, из них 6 критических. Особое внимание уделено новой уязвимости в почтовом сервере Microsoft Exchange. У... |
| 12.11.2021 | Neovera Expands Relationship with AT&T Cybersecurity for Innovative Solutions that Mitigate Risk of Cybersecurity Threat | BOSTON (PRWEB) November 12, 2021
Neovera, a leading managed services provider and Cybersecurity provider for Cloud infrastructure for the last two decades, announces it has expanded its partnership to include AT&T Cybersecurity and is n... |
| 12.11.2021 | Abcbot — новый ботнет, нацеленный на Linux | Исследователи кибербезопасности из Netlab Qihoo 360 раскрыли подробности о новом растущем ботнете «Abcbot», который распространяется подобно червям, заражая системы Linux с последующим запуском распределенных DDoS-атак.
Первая версия вредон... |
| 11.11.2021 | Telemetry Peak Analyzer – An Automatic Malware Campaign Detector | Contributors: Jason Zhang, Stefano Ortolani, Giovanni Vigna
Cyber security threats have been growing significantly in both volume and sophistication over the past decade with no sign of a slowdown. Naturally, this has also been accompanied ... |
| 10.11.2021 | Cisco : AT&T Cybersecurity Offers New Managed SASE Service with Cisco | DALLAS, November 10, 2021
What's the news?AT&T* is expanding its global, managed Secure Access Service Edge (SASE) portfolio to include a new offering. AT&T SASE with Cisco is a converged network and security management solution tha... |
| 10.11.2021 | AT&T Cybersecurity Delivers New Managed SASE Solution | Download release (PDF) AT&T Cybersecurity Delivers New Managed SASE Solution to Connect and Protect the Multi-Cloud, Hybrid Enterprise
AT&T SASE with Cisco empowers innovation through highly secure remote connection and collaboratio... |
| 05.11.2021 | Hunter Becomes Hunted: Zebra2104 Hides a Herd of Malware | Hunter Becomes Hunted: Zebra2104 Hides a Herd of Malware
RESEARCH & INTELLIGENCE / 11.05.21 / The BlackBerry Research & Intelligence Team
Share on Twitter
Share on Facebook
Share on Linked In
Email
Executive Summary
The BlackBerry R... |
| 02.11.2021 | Access Policies and Automation – The Path to Digital Transformation and the Cloud | The inaugural Fortinet Security Summit, provided insights that has allowed many organizations to pause and question their approach to security. The summit was kicked off on September 14 with a keynote from Ruvi Kitov, CEO of Tufin, on "... |
| 26.10.2021 | AT&T Launches 5G Managed Advanced Security Capabilities | Download release (PDF) AT&T Launches 5G Managed Advanced Security Capabilities to Further Protect Enterprise Network Infrastructure
AT&T's security-first approach to 5G provides an operational and competitive edge for businesses
Wha... |
| 12.10.2021 | AT&T : Managed XDR Extends Threat Detection with Machine Learning and Analytics | Download release (PDF) New AT&T Cybersecurity Managed XDR Solution Helps Organizations to Deliver on Digital Transformation Initiatives while Protecting Against Emerging Threats
AT&T Managed XDR provides autonomous endpoint protecti... |
| 29.08.2021 | FOSS News №85 – дайджест материалов о свободном и открытом ПО за 23—29 августа 2021 года | Всем привет!
Продолжаем дайджесты новостей и других материалов о свободном и открытом ПО и немного о железе. Всё самое главное про пингвинов и не только, в России и мире.
Главные темы нового выпуска:
Ядру Linux исполнилось 30 лет!
18 сентяб... |
| 25.08.2021 | RedShield's Web Application Shielding Now Available through AT&T Cybersecurity | WELLINGTON, New Zealand, Aug. 25, 2021 /PRNewswire/ -- RedShield today announced that AT&T Cybersecurity, a world-leading Managed Security Services Provider, has added RedShield's Web Application Shielding to its highly-regarded Managed... |
| 02.07.2021 | Five Ways Machine Identities Are Changing Enterprise Identity And Access Management Strategy | Ted has worked in the security arena for over 25 years, including 10 years with the Dept of Defense and 15 years at Keyfactor. |
| 15.06.2021 | AT&T and Palo Alto get edgy with a new managed solution | Network and security management is increasingly complex thanks to remote access and greater numbers of concurrent users.
With their new Secure Access Service Edge (SASE) offering, AT&T along with Palo Alto Networks delivers an integrate... |
| 30.03.2021 | Apple App Store Allegedly Allows Scam Apps to Steal Users' Bitcoin— Spotting Fake Applications | Giuliano J. de Leon, Tech Times 30 March 2021, 01:03 pm
An Apple user accused App Store of allowing a fake application to steal all his Bitcoin, which is worth around $600,000. He said that an application that he previously installed in Feb... |
| 12.03.2021 | Why SASE is vital for the cybersecurity industry [Q&A] | One of the frameworks that has received greater attention since the acceleration of digital transformation is Secure Access Services Edge (SASE).
But what does its adoption mean for the security industry and how can enterprises best take ad... |
| 09.02.2021 | Digital.com Names Best Vulnerability Management Software of 2021 | SEATTLE (PRWEB) February 09, 2021
Digital.com, a leading independent review website for small business online tools, products, and services, has announced the best vulnerability management software of 2021. The top systems were selected bas... |
| - | What value does Extended Detection and Response (XDR) bring to the cybersecurity market? [Q&A] | As organizations adapt to hybrid working models and modernize business practices, so too must cybersecurity programs.
We talked to Rupesh Chokshi, VP at AT&T Cybersecurity, to discuss key challenges and how XDR is becoming an important ... |