Video Screencast Help

Protection Engine for Cloud Services (formerly Scan Engine)

Results for Protection Engine for Cloud Services (formerly Scan Engine)

Is it naïve of us to think we can ever be perfectly secure? Whether it’s physically or digitally there is always a risk that something bad is going to happen. To protect ourselves physically we install alarms, locks, buy safe cars, have automatic ...
Blog Entry by Robert Shaker | 03 Apr 2013 | 2 comments
This was my second year at the RSA Conference. It was interesting to come back as a "veteran" to the largest security conference (24k attendees according to rumor). I consider myself a veteran since I didn't really see differences ...
Blog Entry by PaulTobia | 01 Apr 2013 | 0 comments
I see sessions popping up in conferences and articles lately prophesying the demise of DLP and that DLP has run its course and is something companies should avoid. I have to ask a simple question: Why is it when attackers get more creative and cunning ...
Blog Entry by Phil Harris | 29 Mar 2013 | 5 comments
The United States is ranked #1 for malicious activity by source and we are responsible for just over 21% of all of the malicious activity.  Much of this has to do with my mother the innocent victim who doesn’t know any better and doesn’t even know there ...
Blog Entry by Joseph.Rogalski | 25 Mar 2013 | 2 comments
Thanks to regulatory requirements most everyone in the corporate world in the US is required to have official annual information security awareness/education/training. This isn't a bad thing per se, but I doubt few of us go beyond a stack of ...
Blog Entry by PaulTobia | 22 Mar 2013 | 0 comments
You know, it’s 2013 and we still have this issue of employees believing that corporate data is their own to do with as they please. In a recent Ponemon survey report ~two thirds of employees believe this to be true. Unfortunately, this is an incredibly ...
Blog Entry by Phil Harris | 20 Mar 2013 | 1 comment
It’s all your fault, really, it is. Whether it’s a lack of caring, naivety or a misunderstanding you executives of companies and leaders of agencies have helped to create an underground ecosystem for attackers to collaborate and coordinate attacks ...
Blog Entry by Robert Shaker | 18 Mar 2013 | 0 comments
Last month, Symantec hosted its 2nd annual internal CyberWar Games and I had the privilege of joining Efrain Ortiz, Ben Frazier, and JR Wikes as part of team Avengers. For five days, we worked on limited sleep, grinding our way through the process of ...
Blog Entry by franklin-witter | 15 Mar 2013 | 0 comments
With the continued uncertainty lingering in the global economy, I think it is likely that spending on new information security initiatives will continue to be highly scrutinized.  This isn’t to say that security initiatives won’t go forward, just that ...
Blog Entry by franklin-witter | 13 Mar 2013 | 0 comments
Over the past few months I’ve noticed a disturbing trend in our industry to talk more about “offensive security.” People are writing and tweeting about “active defenses” or “strikeback capabilities” but it all points to a movement that is at best a ...
Blog Entry by PaulTobia | 11 Mar 2013 | 3 comments