Video Screencast Help

Search

Search results

Quantifying Value of Uptime & Agility             This quick post simply seeks to set context for software leaders hoping to help with the Industrial Internet, or “Industry 4.0” as ...
Blog Entry by Brian Witten | 14 Jul 2015 | 0 comments
Hacking in Major League Baseball Has Evolved As the Community Manager for the Symantec Social Media team, one of ...
Blog Entry by PackMatt73 | 30 Jun 2015 | 0 comments
Many were surprised to read that extremely sophisticated and expensive medical devices, such as X-Ray machines and Blood Gas Analyzers, had been used as a pivot point in more broadly penetrating IT systems in three hospitals.  Even though general ...
Blog Entry by Brian Witten | 24 Jun 2015 | 2 comments
The clock is ticking... This is part two of a three part series discussing the end-of-life (EOL) of Windows Server 2003. As mentioned in  part one , on July 14th, 2015 Microsoft ...
Blog Entry by Digital_Kru | 09 Mar 2015 | 0 comments
Novacoast Webinar September 30th @ 12pm EST Tue, 30 September, 2014 - 12:00 - 13:00 EDT ...
Event by ryanschoenherr | 29 Sep 2014 | 4 comments
Novacoast webinar Mon, 15 September, 2014 - 2:00 - 3:00 PDT Join us on Monday, September 15th to ...
Event by ryanschoenherr | 04 Sep 2014 | 0 comments
Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices. ...
Blog Entry by Axel Wirth | 26 Aug 2014 | 0 comments
Join Symantec's Brook Chelmo and Jeff Barto for a discussion on how to protect your business and information, and keep your communications secure from the recently discovered Heartbleed vulnerability. ...
Blog Entry by vgtero | 24 Apr 2014 | 0 comments
What is big at the big show this year. One of the great things about being the Health IT Officer at a big security firm is that no one really knows what you do.  I get to slip quietly ...
Blog Entry by David Finn | 11 Feb 2014 | 0 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by V4 | 03 Dec 2013 | 0 comments