Video Screencast Help
Scheduled Maintenance: Symantec Connect is scheduled to be down Saturday, April 19 from 10am to 2pm Pacific Standard Time (GMT: 5pm to 9pm) for server migration and upgrades.
Please accept our apologies in advance for any inconvenience this might cause.

IM Manager

Results for IM Manager

Over the past few months I’ve noticed a disturbing trend in our industry to talk more about “offensive security.” People are writing and tweeting about “active defenses” or “strikeback capabilities” but it all points to a movement that is at best a ...
Blog Entry by PaulTobia | 11 Mar 2013 | 3 comments
I came across this article (see link below) not too long ago and it really got me thinking about not only the places where I put my information on the Internet, but the reasons I put my information out there.  Most sites we put our information seem ...
Blog Entry by Phil Harris | 07 Mar 2013 | 0 comments
So what is the big deal if a few of my corporate PCs are infected with malware, what’s the worst that can happen? In this post I want to cover what can be done with a compromised PC and why it is a big deal. Many Security Managers minimize the importance ...
Blog Entry by Joseph.Rogalski | 05 Mar 2013 | 0 comments
While managing Operational Risk for a large IT organization, one of my responsibilities was to work with Corporate Operational Risk to define Key Risk Indicators (KRIs) KRIs were monitored at a corporate level.  We took the easy route by using canned ...
Blog Entry by Joseph.Rogalski | 28 Feb 2013 | 0 comments
Ready for one last slick web application penetration test trick? In this installment we'll explore a subtle and often overlooked vulnerability related to web application authentication. In response to the login request containing posted ...
Blog Entry by vince_kornacki | 26 Feb 2013 | 0 comments
Ready for another cool web application penetration test trick? In this installment we'll cover clickjacking, also known as "UI redressing". Clickjacking is an instance of the classic "confused deputy" problem, and occurs when ...
Blog Entry by vince_kornacki | 22 Feb 2013 | 0 comments
Performing a web application penetration test is not voodoo magic, but rather an exercise in knowledge, prioritization, and efficiency. During years of hard work penetration testers hone their methodology and develop efficient ways of applying their ...
Blog Entry by vince_kornacki | 19 Feb 2013 | 2 comments
Information Technology is radically changing. We can wrap it in terms and buzzwords like cloud, mobility, BYOD, Web 3.0, but the reality is both the sum of and more complex than the names we give it. IT is no longer in the hands of the professionals. ...
Blog Entry by PaulTobia | 12 Feb 2013 | 0 comments
I need a solution We are trying to determine the registration date for screen names registered in Symantec IM manager. There doesn't appear to be anything within the Admin/Reviewer ...
Forum Discussion by happyadministrator | 11 Feb 2013 | 0 comments
In part 1 of this series, we looked at three possible signs you may have been the victim of an APT and how to detect and defend against these activities:  1)Gaps in System and Security Logs; 2) Unexplained Changes in System Configurations; and 3) ...
Blog Entry by franklin-witter | 07 Feb 2013 | 0 comments