Video Screencast Help
Give us your opinion and win with Symantec! Please help us by taking this survey to tell us about your experience with Symantec Connect, so that we can continue to grow and improve.  Take the survey.

Security Intelligence

Public Group | Founded: 17 Apr 2014 | Serving 1 member

Symantec thought leaders empower businesses with security intelligence and in-depth professional knowledge regarding the latest security insights, threats, and protection solutions.

Group Activity

Show:
New blog entry 27 Apr 2015
Ransomware attacks grew 113 percent in 2014, according to the newly released Symantec Internet Security Threat Report Vol 20, which provides an extensive findings and comprehensive investigations of the past year in global threat activity. The rise of ...
New blog entry 24 Apr 2015
Every day, cybercriminals develop new ways to use malicious code (malware) to avoid detection while infecting networks, software and devices – from enterprise level to personal. The newly released Symantec Internet Security Threat Report Vol 20 found ...
New blog entry 22 Apr 2015
Enterprises and consumers are embracing the emergence of cheaper and readily accessible Internet-connected technologies. The Internet of things (IoT) are embedded computing devices with internet connectivity which includes a wide range of devices: ...
New blog entry 21 Apr 2015
It’s an exciting time at Symantec. Like the start of a new baseball season, we’re entering the RSA Conference 2015 with a fresh lineup of upcoming offerings that further advance our Unified Security vision: SymGauge and Quantitative Security (aka ...
New blog entry 14 Apr 2015
The digital threat landscape is rapidly shifting as companies attempt to stay current on what is putting them at risk and how they can protect themselves. However, as the interactive industry evolves, so does the technology and methods used by ...
blog entry comment 24 Mar 2015
New blog entry 16 Mar 2015
Attackers look to the emotional aspects of human decision making to execute their attacks. They use psychological manipulation tactics, as people tend to pay attention to personally relevant messages, especially if there is an urgent call to ...