Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Cyber Security Services

Results for Cyber Security Services

Ransomware threats such as CryptoLocker or CryptoWall are becoming more prevalent in enterprises. The purpose of these threats is quite simple; they are attempting to extort money ...
Blog Entry by Matt Sherman | 04 Dec 2014 | 0 comments
If you're familiar with web application penetration testing and SQL injection then the classic SQL injection exploit string should ring a bell: This exploit string is ...
Blog Entry by Vince Kornacki | 19 Nov 2014 | 0 comments
Like big brother Apache , default Tomcat logging leaves a little something to be desired, especially in regard to forensics. And you know what they say: When Tomcat ...
Blog Entry by Vince Kornacki | 05 Nov 2014 | 0 comments
Part 2: Botnet Infrastructure. Welcome to the second in our series of blog posts on malware evolution and its ...
Blog Entry by Bob Burls | 13 Oct 2014 | 0 comments
Symantec has recently opened a new Security Operations Center (SOC). What does this move mean for global cyber security, and Symantec's growth in leadership in the field? ...
Blog Entry by Samir_Kapuria | 26 Sep 2014 | 1 comment
In order to optimise the success and operation of a franchising model, which could be an organization with affiliate or agent offices, we recommend there should be IT security ...
Blog Entry by Bob Burls | 24 Sep 2014 | 0 comments
The examination of prefetch files is commonly done during live response.  They are easy to grab, quick to analyze and can provide useful information when investigating malicious ...
Blog Entry by Jamie Porter | 11 Sep 2014 | 6 comments
         The term incident response means a lot of things to a lot of people. Historically, words like “unpleasant” or “chaotic” come to mind when thinking about the last time ...
Blog Entry by Clint M. Sand | 05 Aug 2014 | 1 comment
I have a calendar alert goes off at 9:30 AM to “Reach out to Layer 8”, which is a little project I devised for myself. When the reminder fires, I open a file called ...
Blog Entry by Matt Sherman | 04 Aug 2014 | 4 comments
In the previous installment we examined default Apache logging. Now let's pump up the default Apache combined log format in order to supercharge forensic capability! ...
Blog Entry by Vince Kornacki | 04 Aug 2014 | 0 comments