Deals
iPhone deals
Samsung Galaxy deals
Father's Day deals
Business employee
55+
Military
First responders
Nurses & physicians
Teachers
Union
Credit card
Explore wireless
Plans & prices
Phones & devices
Upgrade
Bring your own
Add a Line
Switch and save
Trade in your device
International options
Shop new iPhones
iPhone 16
Samsung Galaxy S25
Why AT&T Wireless
Wireless help
More resources
Explore Internet
Plans & prices
Fiber
All-Fi (Wi-Fi)
Check availability
AT&T Internet Air
Moving services
Bundles
Gaming
Home business
Internet help
Internet Speed Test
More resources
Access from AT&T
Explore DIRECTV
TV bundles
DIRECTV help
U-verse help
Explore AT&T PREPAID
Prepaid plans
Phones
Bring your own phone
Prepaid deals
Prepaid account
Activate your service
Lease-to-Own
Home Phone Services
AT&T Phone
AT&T Phone – Advanced
Landline Phone
Lifeline
Phones & accessories
Digital phone help
Landline phone help
Bundles
Internet + DIRECTV
Internet + Wireless
Internet + Phone
Home office
Smart watches & devices
Smart home
In-car Wi-Fi
All accessories
Headphones
Cases
Chargers
Screen protectors
Speakers & smart home
Internet & TV equipment
PopSockets & more
Gadgets & gaming
Accessory deals

Threat Context & Prevention of Attacks

gvp_ATT-Security-Conference-Scott-Stevens_5000623
Threat Context & Prevention of Attacks
46:46
Dealing with network attacks today can be a bit like finding a needle in a haystack. We need to be able to quickly determine what is malicious from what is safe, then automatically take action to deal with what we just discovered. This approach to securing networks is critical today as attackers continue to evolve their techniques. Once we can deal with these new attacks, the next challenge is to understand the nature of the attack. Prevention is key, but understanding the nature of the attack helps to determine if the attack is part of a larger campaign, a targeted attack on your company, or just broad spectrum malware noise. Today, not only do we need a real-time approach to preventing known and unknown attacks, but we also need the details about these attacks so we can determine the full scope of the threat. This contextual threat intelligence can help us determine what we need to focus on. Attacks continue to evolve. How we prevent them and learn about them needs to evolve as well.