Video Screencast Help

Search

Search results

Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices. ...
Blog Entry by Axel Wirth | 26 Aug 2014 | 0 comments
Phishers are known for capitalizing on current events and using them in their phishing campaigns. Celebrity scandals are popular and Symantec recently observed a phishing attack on the Facebook platform that claimed to have the sex tape of well-known ...
Blog Entry by Avdhoot Patil | 19 Aug 2014 | 0 comments
Webcast Wed, 10 September, 2014 - 10:00 - 11:00 PDT Presented by: Matt Nelson Attorney and ...
Event by Swathi Turlapaty | 12 Aug 2014 | 0 comments
Symantec Security Dashboards Need complete visibility into your environment?  Do you find yourself reactive to breaches or always behind intrusions?  MetriX dashboards can provide ...
Blog Entry by ryanschoenherr | 08 Jul 2014 | 0 comments
Online Thu, 05 June, 2014 - 14:00 - 15:00 EDT   Free Webcast from ITS   Thursday, ...
Event by Chad Dupin | 23 May 2014 | 0 comments
Give an attacker a phish and he will steal some data. Teach an attacker to spear phish and he will steal data bases.   Among the wide diversity of threats facing the modern enterprise, targeted attacks are often the most troubling and difficult ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
What is big at the big show this year. One of the great things about being the Health IT Officer at a big security firm is that no one really knows what you do.  I get to slip quietly ...
Blog Entry by David Finn | 11 Feb 2014 | 0 comments
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail archives, which represent a value for the attacked ...
Article by vik-svo | 13 Jan 2014 | 6 comments
    Hello and welcome to 2014! As we roll in the new year and with our individual list of resolutions make sure we put in protecting identity and securing our data as one of them with a firm commitment to actually carry out this ...
Blog Entry by Amit Chakrabarty | 10 Jan 2014 | 2 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments