Video Screencast Help

Search

Search results

Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices. ...
Blog Entry by Axel Wirth | 26 Aug 2014 | 0 comments
We are looking to hire a CSP resident in the Raleigh, NC area.  The req can be found at: http://www.symantec.com/about/careers/careers.jsp?areq=%2021145BR Please contact Ryan Alves at ryan_alves@symantec.com . Responsibilities ...
Blog Entry by Richard Harsell | 20 Aug 2014 | 0 comments
What else keeps you up at Night? In cooperation with the ECRI Institute, AAMI (Association for the Advancement of Medical Instrumentation) just published their 2014 report on  ...
Blog Entry by Axel Wirth | 14 Jul 2014 | 0 comments
Symantec Security Dashboards Need complete visibility into your environment?  Do you find yourself reactive to breaches or always behind intrusions?  MetriX dashboards can provide ...
Blog Entry by ryanschoenherr | 08 Jul 2014 | 0 comments
A new report from the Ponemon Institute, “Exposing the Cybersecurity Cracks: A Global Perspective,” concludes that global security professionals find themselves “deficient, disconnected, and in the dark” in combating cyber threats. Despite the ...
Blog Entry by vgtero | 02 May 2014 | 0 comments
With the recently discovered Heartbleed vulnerability, information security professionals and end users are feeling the pressure and impact to better protect their information. The task of securing your organization and information can seem overwhelming. ...
Blog Entry by vgtero | 24 Apr 2014 | 0 comments
As far as TV shows are concerned, there are a number of them which my now grown kids and us, the parents, equally enjoy; for example most recently Breaking Bad. But then there are some, where … well, let me phrase it politely, the older generation does ...
Blog Entry by Axel Wirth | 09 Apr 2014 | 0 comments
Symantec launched its 2014 Internet Security Threat Report (ISTR) , Volume 19, which highlights how cybercriminals unleashed the most damaging series of cyberattacks in history – ushering in the era of the “Mega Breach.” Please visit the ISTR ...
Blog Entry by A L Johnson | 08 Apr 2014 | 2 comments
What is big at the big show this year. One of the great things about being the Health IT Officer at a big security firm is that no one really knows what you do.  I get to slip quietly ...
Blog Entry by David Finn | 11 Feb 2014 | 0 comments
Microsoft Security Bulletin On Tuesday the 11th of February Microsoft released the monthly Security Bulletin Summary for February 2014. The summary includes 7 Security Bulletins - 4 are classified as critical; 3 as important:   ...
Blog Entry by SebastianZ | 11 Feb 2014 | 0 comments