AT&T, Singtel and Telefónica team up on threat detection intelligence
.jpg)
AT&T, Singtel and Telefónica are bolstering their threat detection capabilities by sharing threat intelligence information using the AT&T Alien Labs Threat Exchange platform.
The collaborative effort falls under the auspices of the Telco Security Alliance, which all three are members of. A year ago, AT&T become the first North American telco to join the Telco Security Alliance. Etisalat, Singtel, SoftBank and Telefónica were the founding members of the security alliance when it was first announced in 2018.
The Telco Security Alliance is a prime example of there being more safety in numbers when service providers and other organizations share information related to cybersecurity attacks. With increased use of business applications in the cloud, as well as more IoT deployments, security is becoming even more of a priority moving forward.
AT&T, Singtel and Telefónica are sharing the latest threat intelligence information and indicators of compromise (IoCs) related to cybersecurity threats and global attack campaigns. The information is pulled from a variety of sources, including anonymous data from alliance members' security operations centers (SOCs) and security team investigations.
Telco Security Alliance members can share insights and best practices for customers globally by tapping into the expertise of more than 6,000 security experts and a global network of more than 28 SOCs.
"Joint threat intelligence sharing will allow our security analysts to take more proactive means to combat malicious activities," the Telco Security Alliance said in Tuesday's press release. "We will accomplish this by writing and pushing signatures for newly discovered malware and phishing campaigns across customer products and environments down to individual endpoints."
AT&T, Singtel and Telefónica are the first Telco Security Alliance members to participate in the threat intelligence sharing initiative, but other members are expected to join the fray.
“This relationship supports the global fight against cybercrime,” said Jaime Blasco, assistant vice president of product development for AT&T Cybersecurity. “This initiative already proved valuable to AT&T’s visibility into current threats, and as we continue to work together, our focus is on utilizing this relationship to deliver better threat intelligence to our customers.”
AT&T increased its cybersecurity capabilities with its deal to buy cybersecurity company AlienVault for an undisclosed sum in 2018. AlienVault develops tools that identify and manage cyberattacks through its Unified Security Management platform.
source fiercetelecom
Industry: Cyber Security

Latest Jobs
-
- Senior SOC Analyst Level 3. Microsoft Security stack | Ability to achieve SC Clearance
- London
- To attract the right person
-
Job Title: Senior SOC Analyst Level 3. Microsoft Security stack | Ability to achieve SC Clearance Location: Hybrid remote | London / Berkshire Overview: Senior SOC Analyst Level 3 to join a specialist Managed Security Services business. You will be responsible for advanced threat hunting / triage, incident response etc with a strong focus on the Microsoft Security Stack. Key Responsibilities: Lead and resolve complex security incidents / escalations Conduct advanced threat hunting using the Microsoft Security Stack. Build, optimise and maintain workbooks, rules, analytics etc. Correlate data across Microsoft 365 Defender, Azure Defender and Sentinel. Perform root cause analysis and post-incident reporting. Aid in mentoring and upskilling Level 1 and 2 SOC analysts. Required Skills & Experience: The ability to achieve UK Security Clearance (SC) – existing clearance ideal. (Sorry no visa applications) Current experience working with a SOC environment Microsoft Sentinel: Development and tuning of custom analytic rules. Workbook creation and dashboarding. Automation using Playbooks and SOAR integration. Kusto Query Language (KQL): Writing complex, efficient queries for advanced threat hunting and detection. Correlating data across key tables (e.g., SignInLogs, SecurityEvent, OfficeActivity, DeviceEvents). Developing custom detection rules, optimising performance, and reducing false positives. Supporting Sentinel Workbooks, Alerts, and Playbooks through advanced KQL use. Deep understanding of incident response, threat intelligence and adversary techniques (MITRE ATT&CK framework). Strong knowledge of cloud and hybrid security, particularly within Azure. Additional Requirements: Must hold or be eligible to achieve a minimum of Security Clearance (SC) level. Nice to have certifications (e.g., SC-200, AZ-500, GIAC) are desirable. Strong problem-solving and analytical skills. Excellent communication for clear documentation and team collaboration. Please follow Wheaton’s Law.
-
- New Business Sales Hunter | Cyber Security (UK Based)
- London
- To attract the right person
-
New Business Sales Hunter needed | Cybersecurity (UK Based) Are you looking for uncapped commission, a fun and sociable team that drives success with no politics? If so...You must Be UK based - and able to achieve UK SC clearance. (sorry no visas) Have a demonstrable history of sales success in Cyber Security Follow Weatons law. The role: Seeking a proven New Business Sales Hunter to join an established, successful and expanding cyber security firm. New business focused - £1m GP year one target (ramped). Sell a blend of security services & professional services. Ideal experience selling some or all of the following Cyber strategy & risk management Managed detection & response (MDR) Penetration testing Compliance & audit support You: Strong cybersecurity/IT services sales track record. Confident selling into mid-market & enterprise. UK based - London commutable 1x per week. Hunter mindset, full sales cycle ownership. Don't just send an email to apply give me a call on 07884666351
-
- CyberArk Architect
- London
- Upto £110,000 plus bonus and benefits
-
Are you ready to lead from the front and drive innovation in the Identity & Access Management (IAM) space? We’re looking for a seasoned CyberArk Architect who has CDE-CPC ideally or experience with privilege Cloud, someone who can lead with vision, execute with precision, and inspire teams to deliver excellence. As a key leader in our organisation, you’ll bring your strong business acumen and a technology-focused, innovative mindset to the table. You’ll be driving strategic initiatives, shaping transformation programs, and empowering teams to think big and deliver even bigger. Acting as a subject matter expert in CyberArk Leading strategic transformations in: Identity Governance Privileged Access Management (PAM) Access Management Customer Identity and Access Management (CIAM) Building and maintaining strong, collaborative relationships within the team Communicating clearly and confidently — both written and verbal — to deliver updates, raise potential issues, and share insights If you are interested in the above position we are looking for people with: deep expertise and a successful track record in IAM strategy, delivery, or assurance with CyberArk Hold relevant certifications such as CDE in Privileged Cloud or Guardian Have experience in a client-facing role (preferred, but not essential) Thrive in a hybrid working environment and are available to work from our or client London office three days a week Lead with clarity, communicate with impact, and adapt quickly to changing priorities
-
- OUTSIDE IR35 Splunk Engineer- SC Cleared.
- United Kingdom
- N/A
-
OUTSIDE IR35 Splunk Engineer- SC Cleared. You will be responsible for consolidating Splunk ES data from multiple feeds into a single pane of glass to enhance visibility and streamline security operations.