Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Report from the second and final day of the FDA Workshop on Medical Device Security Like with my previous post on this topic, I am using a quote from one of the presenters to report on ...
Blog Entry by Axel Wirth | 23 Oct 2014 | 0 comments
Report from Day 1 of the FDA Workshop on Medical Device Security The title is probably a good quote to reflect the spirit of the first day of the public workshop on “Collaborative ...
Blog Entry by Axel Wirth | 21 Oct 2014 | 0 comments
The Underground Economy, Pt. 8 Most people assume zombies are only fiction reserved for B movies and popular televisions shows. While true in the physical world, this is not the case ...
Blog Entry by Tim G. | 08 Aug 2014 | 0 comments
Following Security Bulletins have been released in July 2014:   Microsoft Microsoft Security Bulletin Summary for July 2014 https://technet.microsoft.com/library/security/ms14-jul Symantec product detections for ...
Blog Entry by SebastianZ | 17 Jul 2014 | 0 comments
The newest version of LiveUpdate Administrator (LUA) - 2.3.3 has been released. The version can be downloaded from here: http://www.symantec.com/docs/TECH134809   What's new in LiveUpdate Administrator 2.3.3 ...
Blog Entry by SebastianZ | 14 Jul 2014 | 0 comments
Although companies spent many years building up their network defenses for PCs, most have spent little time securing the network for smartphones. But there are a great deal more mobile devices than PCs and the sheer volume changes the way security ...
Blog Entry by Solange Deschatres | 30 Jun 2014 | 0 comments
Embora as empresas gastem muitos anos na construção de sua rede de segurança para PCs, a maioria investe pouco tempo protegendo a rede para smartphones. Mas há mais dispositivos móveis do que computadores pessoais e o volume absoluto muda a forma como ...
Blog Entry by Solange Deschatres | 30 Jun 2014 | 0 comments
The Surprising Scope of Mobile Malware Growth Around The World Mobile workforces and BYOD have brought smartphone security to the forefront for enterprises and consumers alike. Due to ...
Blog Entry by Solange Deschatres | 12 Jun 2014 | 0 comments
Join Our Webinar May 14, 2014 Hear the word flimflam and you think of a time of straw hats and cardboard suitcases; of grifters pulling into town to take the rubes with patent medicine, ...
Blog Entry by khaley | 05 May 2014 | 1 comment
Give an attacker a phish and he will steal some data. Teach an attacker to spear phish and he will steal data bases.   Among the wide diversity of threats facing the modern enterprise, targeted attacks are often the most troubling and difficult ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments