Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

Search

Search results

Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices. ...
Blog Entry by Axel Wirth | 26 Aug 2014 | 0 comments
Give an attacker a phish and he will steal some data. Teach an attacker to spear phish and he will steal data bases.   Among the wide diversity of threats facing the modern enterprise, targeted attacks are often the most troubling and difficult ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
Para acompanhar o que veio de novo nas versões 2.x   LUA 2.3.0 2.3.0.71 foi a primeira versão 2.3. Este comunicado contém os seguintes aprimoramentos / otimizações: ·         Informações de configuração LUA pode ser exportado para um ...
Blog Entry by alsbalves | 22 Nov 2013 | 0 comments
Hello, we just shift some customers from Trend Micro Worry Free To EndPoint protection Ent. They used to block some website categories like drugs or social media from Worry Free consoles for some remote sites which are not under the main gateway, ...
Idea by Bassam Jum | 06 Sep 2013 | 1 comment
You must have been taking a long (and probably well deserved) holiday if you have not noticed the increasing use of the term “cyber” in the press recently. Anything security related is now a cyber risk, a cyber incident or a cyber attack. Governments ...
Blog Entry by James Hanlon | 10 Jun 2013 | 1 comment
It is now impossible to tell when the various files were released - and which ones I need based on release date. It used to be that if I needed a later version of a product, I could simply look for the dates that matched to ensure I was getting all the ...
Idea by ShadowsPapa | 30 May 2013 | 2 comments
FileConnect latest changes do no longer include the HTTP download option but only the Java one, which most likely will redirect you to Oracle.com if your browser blocks the plugin. The idea is to restore the HTTP download option on FileConnect. ...
Idea by Shulk | 16 May 2013 | 7 comments
The increased use in the workplace of user-owned devices such as smartphones and tablets, often referred to as bring your own device (BYOD), provides businesses with significant productivity and cost benefits. However, it also presents a number of ...
Blog Entry by Duncan Mills | 04 Apr 2013 | 0 comments
SC Magazine hosts an annual awards dinner at the RSA Conference where they honor the information security industry’s most effective solutions, addressing the biggest security challenges facing organizations. Symantec earned 3 SC Awards on ...
Blog Entry by Pamela Reese | 27 Feb 2013 | 3 comments