Video Screencast Help
Information Unleashed
Showing posts in English
Symantec Corp. | 17 Dec 2013 | 0 comments

By Darren Shou, Director of Symantec Research Labs

Did you know that Symantec supports and funds innovative research that occurs outside of a Symantec office in an academic setting? We’ve been doing this for the past six years via the Symantec Research Labs Graduate Fellowship. This Fellowship is awarded to graduate students who are conducting innovative research that has real-world value, in the areas of information security and storage systems. This week, Symantec announced the recipients of the 2013 Symantec Research Labs Graduate Fellowship – Kai Ren, a Ph.D. candidate in computer science at Carnegie Mellon University, and Christian Rossow, a postdoctoral researcher at Vrije Universiteit Amsterdam in The Netherlands and Ruhr University Bochum in Germany.

The 2013 Symantec Research Labs Graduate Fellowship Recipients
Kai Ren, a Ph.D. candidate in computer science...

Tom Powledge | 05 Dec 2013 | 0 comments

By Tom Powledge, Vice President, Trust Services, Symantec

There's been plenty in the news recently regarding encryption and SSL – which has led some people to wonder how safe the technology really is.  As the leader of Symantec's Trust Services Products & Services organization, I want to assure you that SSL is safe.  Below is some information that may help you understand why, and also inform you about the current state of SSL security.

First, the fundamental key strength of RSA 2048-bit certificates is solid and without question.  Independent cryptography experts have confirmed this, and highly-respected publications such as the MIT Technology Review have published articles on the subject.  As always, organizations that use SSL should make sure they use the strongest algorithms available....

John Eldh | 22 Nov 2013 | 0 comments

Last week at our annual North America Partner Engage event, we pulled back the curtain on Symantec’s new Global Channel Strategy and shared how we are changing the way we go to market. We have committed to delivering more than 5 percent organic revenue growth with operating margins better than 30 percent, and we can’t achieve this goal without our partners. I’d like to take this opportunity to share more details about the new Global Channel Strategy and explain how it represents an important step forward in Symantec’s 4.0 journey.

But first, let me take a brief step back to provide some context around how we got to this point. When Steve Bennett, our CEO, joined Symantec over a year ago, he embarked on a global listening tour where partners, customers and employees voiced a need for Symantec to change. He learned that Symantec had great technology and great people, but we needed to do more to help our customers solve their bigger jobs. In addition,...

Rose Quijano-Nguyen | 21 Nov 2013 | 0 comments

As high-profile information leaks and cybercrimes proliferate, government agencies face the tall responsibility of protecting increasing amounts of data from progressively complex threats. One important way governments are doing this is by creating and continuing to update rigorous security standards by which all of their information systems must comply. In the United States, two leading Symantec products that keep information systems safe–Symantec Shared Service Provider PKI and  Symantec Non-Federal Shared Service Provider PKI Service – received a critical U.S. government certification for use by federal agencies and their contractors.

The products received a FISMA certification, which is...

khaley | 19 Nov 2013 | 0 comments

Whispers.

The secret to predicting the future is to listen for the whisper.

By the time you’ve heard things in a loud, clear voice they have already come true. I’ve been listening to the whispers in 2013 and have a pretty good idea for what we’ll be hearing loud and clear in 2014. Below are my predictions of the top things we’ll hear and what they will mean for us in 2014.

  • People will finally begin taking active steps to keep their information private.
  • Scammers, data collectors and cybercriminals will not ignore any social network, no matter how “niche” or obscure.
  • The “Internet of Things” becomes the “Internet of Vulnerabilities.”
  • Mobile apps will prove that you can like yourself too much.

“Wait a minute…The Internet knows more about me than my own mother?”

People will finally begin taking active steps to keep...

Steve Trilling | 15 Nov 2013 | 1 comment

 

Defending against sophisticated targeted attacks is now the norm, and it’s not just large companies that are being impacted. These state-sponsored attackers are going after smaller companies now too.  Why is that?  Well, small companies often have business relationships with larger companies that may be the ultimate target of attackers. And, because small companies may have fewer security safeguards than their larger partners, they make a good target for attackers.  So how can businesses – large and small – protect themselves against these sophisticated, targeted attacks?

The answer is through a combination of cutting-edge security technology and a vast intelligence network that monitors our Symantec customers’ networks, and the attackers, around the clock. Our aim is to block attacks no matter what their target is or how they try to get in – at your gateway, on the endpoint and in...

Symantec Corp. | 04 Nov 2013 | 0 comments

   It was a pleasure for Symantec to join John Chambers on stage in New York today for Cisco’s Application Centric Infrastructure (ACI)  and Nexus 9000 series launch. ACI represents a big step forward for our industry, enabling IT to automate provisioning of applications down to the network layer, and monitor the health of those applications from the infrastructure up – all through a single pane of glass.
    Symantec is partnering with Cisco to deliver a more secure, compliant and highly available infrastructure for applications and data. We’ll provide the security customers need in such a dynamic environment, including protection against advanced threats — securing their applications and data wherever they are stored and accessed.
...

Rose Quijano-Nguyen | 15 Sep 2013 | 0 comments

By Dr. Rose Quijano-Nguyen, Principal Certification Strategist – Global Vertical Offerings, Symantec Corp.

As remote working arrangements and “bring your own device” programs become more and more common, both the public and private sectors have an increasing need to protect confidential data on mobile devices against mounting cybersecurity threats. Symantec App Center is a mobile application and content management solution that secures corporate data on iOS and Android mobile devices. To allow the public sector to take advantage of the latest mobile technologies in a secure manner, the Symantec App Center Cryptographic Module recently achieved a certification known as the Federal Information Processing...

Cecily Joseph | 13 Sep 2013 | 0 comments

I’m excited to share that our Corporate Responsibility Report for fiscal year 2013 has been published. This annual report provides an opportunity to review our goals from the previous year, acknowledge successes, and reflect on how we can continue to refine our corporate responsibility strategy. We hope that you will take a look and let us know what you think (in exchange for your opinions, we're giving you a chance to vote on how we should direct a $50,000 USD grant - so be sure to visit our stakholder feedback survey!)

We're also hosting our first-ever...

khaley | 03 Sep 2013 | 0 comments

If it’s worth doing, it’s worth doing on the Internet. And it’s not just Silicon Valley startups that feel this way – cybercriminals do, too. In fact, most types of cons and crimes have migrated to the Internet. Nigerian prince scams remain alive and well, finding more willing victims. Robbing banks is now done with a mouse. And in 2012, we saw that kidnapping (called “ransomware,” and in this case holding your computer hostage) finally became viable on the Internet.

At this point, which crimes haven’t gone digital? Well, fortunately technology barriers still remain when it comes to crimes of violence (though some might argue that a DDoS attack comes close), but you might be surprised to learn that blackmail is gaining traction on the Internet.

In February, the Singapore Police sent out a notification warning of a rather tawdry blackmail scam. In essence, female scam artists secretly recorded online sessions with male victims...