Video Screencast Help

Information Unleashed

Results for Information Unleashed

In a recent court case U.S. v. David Nosal, Judge Alex Kozinski ruled that the Computer Fraud and Abuse Act (CFAA), the nation’s anti-hacking law, applies to people accessing data by circumventing technological access barriers, but it does not extend to ...
Blog Entry by Tim_Matthews | 12 Jun 2012 | 1 comment
This blog is the first in a regular series of posts that spotlight how you can manage the kaleidoscope of change taking place right now in your organisation. No matter who ...
Blog Entry by John_Brigden | 07 Jun 2012 | 0 comments
The last few days I spent some time to digest the latest  Symantec Internet Security Threat Report Volume 17 . This comprehensive report provides an overview and analysis of the ...
Blog Entry by Guido Sanchidrian | 24 May 2012 | 2 comments
One of the great challenges businesses face today is enabling productivity by giving people access to the resources they need, without compromising the safety of that ...
Blog Entry by Steve Cullen | 18 May 2012 | 0 comments
In October of 2010, Symantec publicly announced its mobile protection strategy, defining a new era in how Symantec secures and manages the information and identities of consumers, businesses and governments in an increasingly mobile world. At its core, ...
Blog Entry by bduckering | 17 May 2012 | 0 comments
U.S. companies are paying more to notify people impacted by data breaches, according to the 2011 Cost of a Data Breach Study: United States . The average cost to notify victims ...
Blog Entry by Tim_Matthews | 15 May 2012 | 0 comments
Nearly two years ago, an analyst at Gartner said that the industry was facing what he called “ The Broken State of Backup .” Backup has been around for more than a half of a ...
Blog Entry by SeanRegan | 07 May 2012 | 0 comments
By CJ Desai, senior vice president, Endpoint and Mobility Group, Symantec Symantec’s recent 2012 State of Mobility Survey found that organizations across the globe are embracing mobility at unprecedented rates, driven in part by the “Bring ...
Blog Entry by CJ Desai | 04 May 2012 | 0 comments
When it comes to Internet security, organizations shouldn’t feel like it’s only a matter of time before they suffer a catastrophe. But at the same time, it’s important to recognize that there is no single preventive measure that will guarantee safety ...
Blog Entry by khaley | 29 Apr 2012 | 0 comments
With more than 840 million registered users, Facebook has long been everyone’s favorite online location. We update our status, check in to our favorite shops and restaurants, play social games, post family photos and live our lives increasingly in the ...
Blog Entry by Marian Merritt | 25 Apr 2012 | 0 comments