Video Screencast Help

Search

Search results

Give an attacker a phish and he will steal some data. Teach an attacker to spear phish and he will steal data bases.   Among the wide diversity of threats facing the modern enterprise, targeted attacks are often the most troubling and difficult ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
What is big at the big show this year. One of the great things about being the Health IT Officer at a big security firm is that no one really knows what you do.  I get to slip quietly ...
Blog Entry by David Finn | 11 Feb 2014 | 0 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
Granted, there are easier to decipher acronyms than the one describing the Manufacturer Disclosure Statement for Medical Device Security, short MDS2. The initial version was developed in 2008 through a cooperation of NEMA (National Electrical ...
Blog Entry by Axel Wirth | 11 Nov 2013 | 0 comments
Symantec Encryption Releases 3.3.1/10.3.1 In this release, we support Windows 8, increase our Linux platform support, and as always improve security whenever appropriate.  Here’s a summary of what’s new: Support Windows 8 Pro and Enterprise ...
Blog Entry by Kelvin_Kwan | 17 Sep 2013 | 13 comments
This article is written based on wide spread Internet reports from Black Hat Conference at Las Vegas. Recent advances in math and cryptology research in the academic field indicate that there might be mathematical algorithms or solutions in place to ...
Blog Entry by Tariq Naik | 06 Aug 2013 | 0 comments
Thousands of years ago, news traveled at the pace of man or animal. I mean to say you would only learn what someone else was doing or what was happening either in the next town, village, kingdom, etc. only as fast as it could physically get to you. It ...
Blog Entry by Robert Shaker | 29 Jul 2013 | 4 comments
  You Have Choices On July 1, 2013, Symantec will officially announce that all customers with active maintenance for Symantec Endpoint Encryption Full Disk Edition (SEE FDE) will automatically have their licenses migrated to our new FlexChoice ...
Blog Entry by Kelvin_Kwan | 10 Jun 2013 | 1 comment
Let’s face it users cannot be trusted to know their entire password, I am not talking about the user that writes down their passwords on sticky notes the bad guys would need physical access to actually access those. What I am really speaking to how ...
Blog Entry by Joseph.Rogalski | 29 Apr 2013 | 9 comments
WordPress is the most commonly used blogging platform. It is easy to install and has a great ecosystem of plugins and enhancements that extend its capabilities beyond simply posting pictures of your cats. Unfortunately, millions of inexperienced users ...
Blog Entry by uuallan | 23 Apr 2013 | 0 comments