AT&T Cybersecurity

AT&T Cybersecurity

@attcyber

Followers79.6K
Following3.9K

AT&T Cybersecurity helps make your network more resilient to overcome the cybersecurity threats that are now part of modern business.

Dallas, TX, USA
Joined on February 12, 2009
@attcyber Statistics

We looked inside some of the tweets by @attcyber and found useful information for you.

Inside 100 Tweets

Time between tweets:
6 hours
Average replies
0
Average retweets
5
Average likes
4
Tweets with photos
100 / 100
Tweets with videos
0 / 100
Tweets with links
0 / 100

Rankings (sorted by number of followers)

115. in country United States and category Software

386. in category Software

Fun Fact

46% of U.S. social media users now access platforms such as Twitter and Facebook via their mobile phone, up 9% – almost one-quarter overall – from 2011.

To help protect corporate devices during remote work, many organizations have implemented URL filtering, a technique that restricts the kinds of content that users may access.

#Guestblogger @ErickaChick shares more: 
https://t.co/I8tkLhhPEF https://t.co/Iajp5ux16d

To help protect corporate devices during remote work, many organizations have implemented URL filtering, a technique that restricts the kinds of content that users may access. #Guestblogger @ErickaChick shares more: https://t.co/I8tkLhhPEF https://t.co/Iajp5ux16d

2020 brought #security challenges that will continue through 2021 in the #financialservices industry.
#Guestblogger @nahlawrites discusses the 5 #cybersecurity risks facing this sector https://t.co/WKQt9GQpUY https://t.co/UMlLIjS0vk

2020 brought #security challenges that will continue through 2021 in the #financialservices industry. #Guestblogger @nahlawrites discusses the 5 #cybersecurity risks facing this sector https://t.co/WKQt9GQpUY https://t.co/UMlLIjS0vk

By next year, there will be about 18 billion #IoT devices at the edge - is your business ready to defend against #security risks and vulnerabilities? Read tips here https://t.co/rB3NRJi9tK @IoTWorldToday #IT https://t.co/akntjK2UoJ

By next year, there will be about 18 billion #IoT devices at the edge - is your business ready to defend against #security risks and vulnerabilities? Read tips here https://t.co/rB3NRJi9tK @IoTWorldToday #IT https://t.co/akntjK2UoJ

The attack surface is constantly changing thanks to issues with the lifecycle of #IT devices and platforms, but don’t worry — #ATT Managed Vulnerability Program is here to help. 

Discover how this solution can benefit your business: https://t.co/KJTCEyjQpz https://t.co/sYIflyBVNU

The attack surface is constantly changing thanks to issues with the lifecycle of #IT devices and platforms, but don’t worry — #ATT Managed Vulnerability Program is here to help. Discover how this solution can benefit your business: https://t.co/KJTCEyjQpz https://t.co/sYIflyBVNU

Vulnerability Management Program - what is it, and does your organization need one?
#Guestblogger @nickcavalancia provides tips for building one in-house or using an as-a-service program: https://t.co/pNqFFLK6KR https://t.co/WUaijfaxFf

Vulnerability Management Program - what is it, and does your organization need one? #Guestblogger @nickcavalancia provides tips for building one in-house or using an as-a-service program: https://t.co/pNqFFLK6KR https://t.co/WUaijfaxFf

✔️ 24x7 proactive #security monitoring
✔️ Built on Unified Security Management (USM) platform
✔️ Powered by AT&T Alien Labs threat intelligence

That’s #ATT Managed Threat Detection and Response.

Learn more: https://t.co/EZnki6KXgR https://t.co/j7ABihWB1R

✔️ 24x7 proactive #security monitoring ✔️ Built on Unified Security Management (USM) platform ✔️ Powered by AT&T Alien Labs threat intelligence That’s #ATT Managed Threat Detection and Response. Learn more: https://t.co/EZnki6KXgR https://t.co/j7ABihWB1R

Next-gen antivirus, legacy antivirus, and #endpoint detection and response - What's the difference?
#Guestblogger @ErickaChick explains: https://t.co/aVkcT4pAbC https://t.co/Wrf0q36Knm

Next-gen antivirus, legacy antivirus, and #endpoint detection and response - What's the difference? #Guestblogger @ErickaChick explains: https://t.co/aVkcT4pAbC https://t.co/Wrf0q36Knm

Recently, threat actors have been utilizing a Golang tool to avoid antivirus detection and act as a #malware loader. Our #ATT Alien Labs team analyzed the code and identified malware authors utilizing this tool: https://t.co/GXBkeKXkwv #threatintel #ATTCybersecurity https://t.co/slIjkljak0

Recently, threat actors have been utilizing a Golang tool to avoid antivirus detection and act as a #malware loader. Our #ATT Alien Labs team analyzed the code and identified malware authors utilizing this tool: https://t.co/GXBkeKXkwv #threatintel #ATTCybersecurity https://t.co/slIjkljak0

Understanding risk management and how to proactively apply it to your #cybersecurity program https://t.co/pCqzqXljA3 @TechRepublic #infosec #CISO https://t.co/dnQpgZ401b

Understanding risk management and how to proactively apply it to your #cybersecurity program https://t.co/pCqzqXljA3 @TechRepublic #infosec #CISO https://t.co/dnQpgZ401b

Tips for strengthening #Kubernetes #security - read today's #guestblog from @DMBisson on creating Kubernetes Pod Security Policies and more https://t.co/SHowumAv82 https://t.co/vroKIEMmfF

Tips for strengthening #Kubernetes #security - read today's #guestblog from @DMBisson on creating Kubernetes Pod Security Policies and more https://t.co/SHowumAv82 https://t.co/vroKIEMmfF

The new year is finally here, and we want your organization to be prepared for whatever it brings.
Check out this #ATTCybersecurity on-demand webcast as our consulting experts discuss the priorities needed to be cyber resilient: https://t.co/kD87vHye3D https://t.co/Kr4vJKH6Pw

The new year is finally here, and we want your organization to be prepared for whatever it brings. Check out this #ATTCybersecurity on-demand webcast as our consulting experts discuss the priorities needed to be cyber resilient: https://t.co/kD87vHye3D https://t.co/Kr4vJKH6Pw

Pass-the-cookie attacks are bypassing multifactor authentication. Here's what you need to know https://t.co/Fk8q0ymzxm @itpro #cybersecurity #IT #cloud https://t.co/ponxvsaB75

Pass-the-cookie attacks are bypassing multifactor authentication. Here's what you need to know https://t.co/Fk8q0ymzxm @itpro #cybersecurity #IT #cloud https://t.co/ponxvsaB75

The adoption of #Kubernetes to manage containerized workloads and services are on the rise. Unfortunately, so are Kubernetes #security risks.

#Guestblogger @DMBisson is sharing how to get started with Kubernetes Pod security: https://t.co/yjcY16LIOO https://t.co/OPij6a6TOY

The adoption of #Kubernetes to manage containerized workloads and services are on the rise. Unfortunately, so are Kubernetes #security risks. #Guestblogger @DMBisson is sharing how to get started with Kubernetes Pod security: https://t.co/yjcY16LIOO https://t.co/OPij6a6TOY

As the COVID-19 vaccine rollout continues globally, so do the cyberattacks. In December, attacks on #healthcare institutions increased by 51%. Read more on the most popular target countries and attack vectors https://t.co/NB3RIyQaeH @ITProPortal #cybersecurity https://t.co/htfLx33pit

As the COVID-19 vaccine rollout continues globally, so do the cyberattacks. In December, attacks on #healthcare institutions increased by 51%. Read more on the most popular target countries and attack vectors https://t.co/NB3RIyQaeH @ITProPortal #cybersecurity https://t.co/htfLx33pit

Analysis of SideWinder APT - today's AT&T Alien Labs blog from @MalwareKiwi takes a close look at malicious activities since 2017 to help defenders https://t.co/LvjGZ1Yvhh https://t.co/RcdBAahLHS

Analysis of SideWinder APT - today's AT&T Alien Labs blog from @MalwareKiwi takes a close look at malicious activities since 2017 to help defenders https://t.co/LvjGZ1Yvhh https://t.co/RcdBAahLHS

The use cases for #5G are almost unlimited, and organizations need to be prepared to utilize this new technology. 
Check out our on-demand webinar, where we discuss the most interesting findings from our recent #ATTCybersecurity Insights Report: https://t.co/2Mz88EF10P https://t.co/0pTHAAOjZB

The use cases for #5G are almost unlimited, and organizations need to be prepared to utilize this new technology. Check out our on-demand webinar, where we discuss the most interesting findings from our recent #ATTCybersecurity Insights Report: https://t.co/2Mz88EF10P https://t.co/0pTHAAOjZB

When the pandemic hit, #ATTCybersecurity stepped up to help #network customers.
Our VP, @RupeshChokshi, shares how we supported our customers in a time of need: https://t.co/Y9g7m5xnNP https://t.co/k4pDC3zf55

When the pandemic hit, #ATTCybersecurity stepped up to help #network customers. Our VP, @RupeshChokshi, shares how we supported our customers in a time of need: https://t.co/Y9g7m5xnNP https://t.co/k4pDC3zf55

#Edge computing will solve real problems for organizations, but as with any new technology, businesses should prepare for new #security risks - here's a deeper look at how edge approaches may evolve https://t.co/pTYp9fJiuv @InfoWorld #IT https://t.co/6fKWFpiLbk

#Edge computing will solve real problems for organizations, but as with any new technology, businesses should prepare for new #security risks - here's a deeper look at how edge approaches may evolve https://t.co/pTYp9fJiuv @InfoWorld #IT https://t.co/6fKWFpiLbk

Next Page