Start your SASE readiness consultation today. Learn more ⟶
  • Support
  • Contact
AT&T Business
AT&T Business
AT&T Cybersecurity
Contact us
  • Products
    • Cybersecurity Consulting Services
      • Cyber Strategy
      • Strategy and Roadmap Planning
      • Enterprise Security Assessment Services
      • Risk-based Cyber Posture Assessment
      • Risk and Compliance
      • Security Compliance
      • Vulnerability and Threat Management
      • Managed Vulnerability Program
      • Penetration Testing
      • Adversary Simulation Services
      • Incident Response Services
      • CSO Advisory Services
      • Cybersecurity IQ Training
      • Strategy and Roadmap Planning
      • Enterprise Security Assessment Services
      • Risk-based Cyber Posture Assessment
      • Security Compliance
      • Managed Vulnerability Program
      • Penetration Testing
      • Adversary Simulation Services
      • Incident Response Services
      • Cybersecurity IQ Training
    • Managed Security Services
      • Network Security
      • Secure Web Gateway
      • Secure Remote Access
      • SASE Branch with Fortinet
      • SASE with Palo Alto Networks
      • Reactive Distributed Denial of Service Defense
      • View All
      • Threat Detection
      • Managed Threat Detection and Response
      • Endpoint Security
      • SentinelOne
      • MobileIron
      • Lookout Mobile Endpoint Security
      • Secure Web Gateway
      • Secure Remote Access
      • SASE Branch with Fortinet
      • SASE with Palo Alto Networks
      • Reactive Distributed Denial of Service Defense
      • Managed Threat Detection and Response
      • SentinelOne
      • MobileIron
      • Lookout Mobile Endpoint Security
    • Network Security
      • AT&T Trusted Internet Access
      • Secure Web Gateway
      • Secure Remote Access
      • Secure Workforce with Check Point
      • Network Based Firewalls
      • Premises Based Firewalls
      • Premises-Based Firewall Express with Check Point
      • Enhanced Cybersecurity Services
      • AT&T Infrastructure and Application Protection
      • Reactive Distributed Denial of Service Defense
      • AT&T Application Layer Security
      • AT&T Trusted Internet Access
      • Secure Web Gateway
      • Secure Remote Access
      • Secure Workforce with Check Point
      • Network Based Firewalls
      • Premises Based Firewalls
      • Premises-Based Firewall Express with Check Point
      • Enhanced Cybersecurity Services
      • AT&T Infrastructure and Application Protection
      • Reactive Distributed Denial of Service Defense
      • AT&T Application Layer Security
    • Endpoint Security
      • Endpoint Security
      • SentinelOne
      • MobileIron
      • VMware Workspace ONE®
      • IBM MaaS360
      • Lookout Mobile Endpoint Security
      • McAfee Endpoint Protection
      • Samsung Knox
      • SentinelOne
      • MobileIron
      • VMware Workspace ONE®
      • IBM MaaS360
      • Lookout Mobile Endpoint Security
      • McAfee Endpoint Protection
      • Samsung Knox
    • Threat Detection and Response
      • AT&T Threat Solutions
      • Managed Threat Detection and Response
      • Threat Detection and Response for Government
      • USM Anywhere
      • USM Anywhere Advisors
      • XDR for MSSPs

      Powered by
      AT&T Alien Labs

      • AT&T Threat Solutions
      • Managed Threat Detection and Response
      • Threat Detection and Response for Government
      • USM Anywhere
      • USM Anywhere Advisors
      • XDR for MSSPs
  • Solutions
    • See All Solutions
    Compliance
    • Overview
    • GDPR
    • HIPAA
    • ISO 27001
    • PCI DSS
    • SOC 2
    Industry
    • Education
    • Energy Sector
    • Federal
    • Financial Services
    • Healthcare
    • Manufacturing
    • MSSPs
    • Retail
    Environment
    • 5G
    • AWS
    • Azure
    • Cloud
    • IOT/Mobility
    • Hybrid
    • Network
    • Remote Workforce
    Security Use Cases
    • Intrusion Detection
    • Secure Access Service Edge
    • Secure Web Gateway
    • SIEM Platform Solutions
    • XDR
    • Zero Trust Architecture
    View All Solutions ⟶
  • Partners
    • Become a Partner
    Become a Partner
    • All Partner Programs
    • MSSP Program
    • Reseller Program
    • Partner Portal Login
    Find a Partner
    • Find an MSSP
    • Find a Reseller
    • Professional Services
    Technology Partners
    • USM Anywhere Integrations
    • OTX Partners
    Become a Partner ⟶
  • Resources

    Explore The Hub, our home for all virtual experiences

    Explore now ⟶
    • View All Resources
    Product Resources
    • Customer Stories
    • Product Briefs
    • Product Demos
    • Product Reviews
    • Solution Briefs
    • Use Cases
    • Free Trial
    Security Resources
    • Analyst Reports
    • Blogs
    • eBooks
    • Videos
    • Webcasts
    • White Papers
    • Industry Reports
    Customer Resources
    • Success Center
    • Certification
    • Customer Success
    • Documentation
    • Professional Services
    • Support Overview
    • Training
    Browse by Topic
    • Incident Response
    • Intrusion Detection
    • Partner: MSSP & Reseller
    • Regulatory Compliance
    • Security Operations Center
    • SIEM & Log Management
    • Threat Detection
    • Threat Intelligence
    View All Resources ⟶
  • AT&T Alien Labs
  • Contact
  • Support
Get price
  1. AT&T Cybersecurity
  2. Blog
  3. AT&T Security Essentials Blog

Security essentials

  • Categories:
  • All blogs
  • Security essentials
  • AT&T Alien Labs research
Categories
  • All blogs
  • Security essentials
  • AT&T Alien Labs research
AT&T Cybersecurity Insights Report: A Focus on SLED
Security Essentials
AT&T Cybersecurity Insights Report: A Focus on SLED
Jul 6, 2022   |   Theresa Lanowitz
Read
A guide to teaching cybersecurity skills to special needs students
Security Essentials
A guide to teaching cybersecurity skills to special needs students
Jun 29, 2022   |   Karoline Gore
Read
Authenticating legacy apps with a reverse proxy
Security Essentials
Authenticating legacy apps with a reverse proxy
Jun 28, 2022   |   Keith Casey
Read

2022 AT&T Cybersecurity Insights Report

Securing the Edge.

Get the cybersecurity report ⟶

2022 AT&T Cybersecurity Insights Report
Stories from the SOC - Detecting internal reconnaissance
Security Essentials
Stories from the SOC - Detecting internal reconnaissance
Jun 27, 2022   |   Nathan Vail
Read
All you need to know about data security and its benefits for small businesses
Security Essentials
All you need to know about data security and its benefits for small businesses
Jun 23, 2022   |   Ben Herzberg
Read
The three core strengths of USM Anywhere
Security Essentials
The three core strengths of USM Anywhere
Jun 21, 2022   |   Tony Simone
Read
API attack types and mitigations
Security Essentials
API attack types and mitigations
Jun 20, 2022   |   Ross Moore
Read
New in Cybersecurity - Insights, threat trends, & RSA learnings
Security Essentials
New in Cybersecurity - Insights, threat trends, & RSA learnings
Jun 17, 2022   |   Kate Brew
Read
API security: 12 essential best practices to keep your data & APIs safe
Security Essentials
API security: 12 essential best practices to keep your data & APIs safe
Jun 16, 2022   |   Nahla Davies
Read
1 2 3 › ››
AT&T Business
From the Blog
Theresa Lanowitz

Theresa Lanowitz

Jul 6, 2022

AT&T Cybersecurity Insights Report: A Focus on SLED

Explore All Blog Posts ›
Twitter Linkedin Facebook Youtube Instagram
Who We Are
  • Alien Labs
  • Customers
  • Careers
  • Contact Us
News
  • Newsroom
  • Events
  • Blogs
Partners
  • Partner Programs
  • Partner Portal
Products
  • AT&T Managed Threat Detection and Response
  • USM Anywhere
  • XDR for MSSPs
  • Open Threat Exchange (OTX)
  • OSSIM
Solutions
  • Cloud Security Monitoring
  • Threat Detection
  • Intrusion Detection
  • SIEM platform solutions
  • Vulnerability Assessment
  • See All Solutions
Resources
  • Resources
  • Blogs
  • Customer Reference Guide
Customer Success
  • Support & Services
  • Success Center
  • Documentation Center
  • Training
  • Certification
Contact us

© Copyright 2022

  • Privacy Policy
  • Website Terms of Use
  • GDPR
  • Cookie Policy
  • Do Not Sell My Personal Information

We use cookies to provide you with a great user experience. By using our website, you agree to our Privacy Policy and Website Terms of Use.