Video Screencast Help

Cyber Security Services

Results for Cyber Security Services

Ransomware threats such as CryptoLocker or CryptoWall are becoming more prevalent in enterprises. The purpose of these threats is quite simple; they are attempting to extort money ...
Blog Entry by Matt Sherman | 18 Feb 2015 | 0 comments
When I think of the cyber security realm, three characteristics come top of mind- Velocity, Volume and Variety. These three facets of the attack landscape make security a ...
Blog Entry by Samir Kapuria | 12 Feb 2015 | 0 comments
summary Most prevention and detection technologies and processes fail.  This may sound like heresy coming from an ...
Blog Entry by franklin-witter | 02 Feb 2015 | 0 comments
There’s no better way to learn something than by doing. With this in mind, Symantec created CyberWar Games, an innovative approach to understanding the cyber threats our customers face every day by giving employees the opportunity to walk in the ...
Blog Entry by Michael Garvin | 21 Jan 2015 | 4 comments
If you're familiar with web application penetration testing and SQL injection then the classic SQL injection exploit string should ring a bell: This exploit string is ...
Blog Entry by Vince Kornacki | 19 Nov 2014 | 0 comments
Like big brother Apache , default Tomcat logging leaves a little something to be desired, especially in regard to forensics. And you know what they say: When Tomcat ...
Blog Entry by Vince Kornacki | 05 Nov 2014 | 0 comments
Part 2: Botnet Infrastructure. Welcome to the second in our series of blog posts on malware evolution and its ...
Blog Entry by Bob Burls | 13 Oct 2014 | 0 comments
Symantec has recently opened a new Security Operations Center (SOC). What does this move mean for global cyber security, and Symantec's growth in leadership in the field? ...
Blog Entry by Samir_Kapuria | 26 Sep 2014 | 1 comment
In order to optimise the success and operation of a franchising model, which could be an organization with affiliate or agent offices, we recommend there should be IT security ...
Blog Entry by Bob Burls | 24 Sep 2014 | 0 comments
The examination of prefetch files is commonly done during live response.  They are easy to grab, quick to analyze and can provide useful information when investigating malicious ...
Blog Entry by Jamie Porter | 11 Sep 2014 | 6 comments