Video Screencast Help

Attacks

Results for Attacks

Over the past couple of years, we have seen social engineering attacks graduate from email to that increasingly prevalent form of communication - social media. By ‘social engineering’ we’re talking about online confidence tricks - anything that can dupe ...
Blog Entry by Kari Ann | 23 Jan 2014 | 1 comment
Based on discussions we are having across our customer base, we know that the Internet of Things (IoT) is a growing phenomenon. It’s not particularly new - after all, organisations have been monitoring the state of their buildings and equipment, and ...
Blog Entry by Sian John | 02 Jan 2014 | 0 comments
In my previous blog I talked about the as-is state of enterprise security. Now I’d like to paint a picture of a much better future state that I believe is achievable, and then I’ll tell you how we can make that state a reality. First, in our ...
Blog Entry by Carey Nachenberg | 14 Nov 2013 | 0 comments
Leverage Vulnerability Assessments within Symantec Website Security SSL Certificates Our online world is rife with shadowy creatures; it’s riddled with crime organizations, activist groups, government entities, and lone hackers. Why they breach ...
Blog Entry by CDeBrine | 21 Nov 2012 | 0 comments
The July edition of the Symantec Intelligence report provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to ...
Blog Entry by Symantec Analys... | 08 Aug 2012 | 0 comments