Security

Symantec’s 2015 Internet Security Threat Report: The Cyber Landscape 0 commentsSecurity

Symantec’s 2015 Internet Security Threat Report: The Cyber Landscape

April 16, 2015 at 11:48 am

Download Symantec’s 2015 Internet Security Threat Report at http://www.symantec.com/security_response/publications/threatreport.jsp?cid=70150000000digEAAQ Cyberattackers are increasingly savvy, moving faster and causing greater damage. Symantec’s 2015 ISTR sheds light on […]

Read more
The Risks and Rewards of Mobile Apps 0 commentsSecurity

The Risks and Rewards of Mobile Apps

March 23, 2015 at 9:50 am

Overview of the risks and rewards of employees using mobile apps for business.

Read more
Fake Fingerprints Could Help Fight Fraud 0 commentsSecurity

Fake Fingerprints Could Help Fight Fraud

March 11, 2015 at 9:39 am

A technique for creating artificial fingerprints could see banknotes, jewellery and even fingers tagged with a similar unique pattern to fight counterfeiters

Read more
‘FREAK’ Attack Courtesy Of Age-Old Government Policies 0 commentsSecurity

‘FREAK’ Attack Courtesy Of Age-Old Government Policies

March 4, 2015 at 9:54 am

“FREAK” attack allows hackers to gain access to your encrypted data.

Read more
Introduction to Symantec Ghost Solution Suite 3.0 0 commentsSecurity

Introduction to Symantec Ghost Solution Suite 3.0

March 3, 2015 at 9:18 am

For more information visit: http://www.ghost.comGhost Solution Suite 3.0 will be available in the Summer of 2015. Watch this Intro video to get a quick glimpse of […]

Read more
Protect Your Data with Symantec Endpoint Encryption 0 commentsSecurity

Protect Your Data with Symantec Endpoint Encryption

February 27, 2015 at 10:42 am

Symantec Endpoint Encryption provides organizations with strong full-disk and removable media encryption and intuitive management for enterprise deployments and easy audit compliance.

Read more
SIM Maker Gemalto Says No Evidence Of Mass Encryption Theft 0 commentsSecurity

SIM Maker Gemalto Says No Evidence Of Mass Encryption Theft

February 26, 2015 at 9:10 am

Gemalto says it suspects intelligence agencies did try to get into its networks but never stole SIM encryption as suggested in earlier reports.

Read more
Hybrid Cloud Monitoring: End-to-End Application Performance Visibility 0 commentsSecurity

Hybrid Cloud Monitoring: End-to-End Application Performance Visibility

February 24, 2015 at 8:58 am

Monitor applications in your hybrid cloud environment today with a free 30 day trial of Server & Application Monitor:http://bit.ly/HybridCloudMonitoring

Read more
How Companies Are Responding To Lenovo’s Superfish Adware 0 commentsSecurity

How Companies Are Responding To Lenovo’s Superfish Adware

February 23, 2015 at 9:31 am

Lenovo and other organizations are taking steps to mitigate the risk posed by Superfish. Superfish’s developers? Not so much.

Read more
Snowden Report: U.S., U.K. Agencies Breach SIM Card Security 0 commentsSecurity

Snowden Report: U.S., U.K. Agencies Breach SIM Card Security

February 20, 2015 at 8:52 am

The NSA and Britain’s GCHQ reportedly obtained keys to the SIM cards that encrypt wireless traffic between handsets and carriers.

Read more
The Internet Is About To Get A Little Faster For Everyone 0 commentsSecurity

The Internet Is About To Get A Little Faster For Everyone

February 19, 2015 at 9:51 am

An long-anticipated update in HTTP, the language that your web browser uses to load webpages, will make the internet faster and safer for everyone.

Read more
How To Get Better Sleep 0 commentsSecurity

How To Get Better Sleep

February 19, 2015 at 9:43 am

Some tips to combat sleep deprivation!

Read more
Why Symantec SSL? 0 commentsSecurity

Why Symantec SSL?

February 18, 2015 at 9:29 am

For more information visit: http://go.symantec.com/ssl Learn why the world’s largest financial institutions and most heavily trafficked websites trust Symantec Website Security Solutions for their SSL and more.

Read more
‘Death Star of Malware Galaxy’ Could Be Linked to NSA 0 commentsSecurity

‘Death Star of Malware Galaxy’ Could Be Linked to NSA

February 17, 2015 at 9:25 am

Kaspersky Lab just revealed its findings on “one of the most sophisticated cyber attack groups in the world.” That group could be linked to the […]

Read more
Symantec Secure App Service for Enterprise Code Signing 0 commentsSecurity

Symantec Secure App Service for Enterprise Code Signing

February 3, 2015 at 10:49 am

Discover how Secure App Service is the key to smarter enterprise security, with centralized management of code signing keys and activities. Learn how to stay […]

Read more