Video Screencast Help

Email Security.cloud

Results for Email Security.cloud

寄稿: Christopher Mendes 2013 年 4 月 15 日、多数の参加者が自己の限界に挑みながら完走を目指していたボストンマラソンを卑劣な行為が襲いました。ゴール付近で 2 度の爆発事件が発生したのです。事件が起きてからわずか数時間のうちに、マルウェアが仕組まれた大量のスパムメールが出回りはじめました。 ...
Blog Entry by Samir_Patil | 18 Apr 2013 | 0 comments
Contributor: Christopher Mendes On the afternoon of April 15, 2013, just when many people were on the cusp of conquering another personal milestone by completing the Boston Marathon, they were hit hard by an act of cowardice. Two bombs struck ...
Blog Entry by Samir_Patil | 17 Apr 2013 | 0 comments
寄稿: Sandeep Ingale こと金融機関について言えば、基本的なセキュリティ対策(ベストプラクティス)を知ることは、すべての顧客の持つ権利です。多くの金融機関はこういった情報を Web サイトに掲載しており、顧客が安全を保ちつつサービスを十分に利用するための方法を伝えています。しかし皮肉なことに、顧客を保護するための案内であるはずの、こうした Web ページがフィッシング詐欺師に模倣され、ユーザーを欺いて個人情報を引き出す目的に利用されています。 3 ...
Blog Entry by Mathew Maniyara | 16 Apr 2013 | 0 comments
Contributor: Avdhoot Patil Phishers continue to target Indian movies with phishing scams. The phishing site featuring the movie “Bodyguard” is one example, and this month Symantec observed a phishing attack in which phishers used a song from ...
Blog Entry by Ashish Diwakar | 16 Apr 2013 | 0 comments
Contributor: Sandeep Ingale When it comes to financial organizations, being informed about best security practices is every customer’s right. Many organizations provide this information on their websites to help their customers learn how to take ...
Blog Entry by Mathew Maniyara | 16 Apr 2013 | 0 comments
One of the biggest problems information security encounters is either the perception or reality of slowing down the business. I’ve encountered this myself in my career.  One of the ways I dealt with this problem is through an effective use of the risk ...
Blog Entry by Phil Harris | 16 Apr 2013 | 0 comments
Recently, there have been a string of high profile compromises attacking both could based services, a cloud based note taking site, a fast food companies Twitter account, as well as corporations and individuals.  A well known technology writer had his ...
Blog Entry by Joseph.Rogalski | 08 Apr 2013 | 3 comments
Is it naïve of us to think we can ever be perfectly secure? Whether it’s physically or digitally there is always a risk that something bad is going to happen. To protect ourselves physically we install alarms, locks, buy safe cars, have automatic lights, ...
Blog Entry by rshaker2 | 03 Apr 2013 | 2 comments
This was my second year at the RSA Conference. It was interesting to come back as a "veteran" to the largest security conference (24k attendees according to rumor). I consider myself a veteran since I didn't really see differences between ...
Blog Entry by PaulTobia | 01 Apr 2013 | 0 comments
I see sessions popping up in conferences and articles lately prophesying the demise of DLP and that DLP has run its course and is something companies should avoid. I have to ask a simple question: Why is it when attackers get more creative and cunning ...
Blog Entry by Phil Harris | 29 Mar 2013 | 5 comments