Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Thousands of years ago, news traveled at the pace of man or animal. I mean to say you would only learn what someone else was doing or what was happening either in the next town, village, kingdom, etc. only as fast as it could physically get to you. It ...
Blog Entry by Robert Shaker | 29 Jul 2013 | 4 comments
“Counting factors is a poor way to estimate authentication strength,” says Gartner analyst Ant Allan in a recent article by NetworkWorld’s Bob Violino, which highlights many of the reasons more businesses are turning to stronger authentication, in a way ...
Blog Entry by MelanieLopez | 25 Jun 2013 | 0 comments
FileConnect latest changes do no longer include the HTTP download option but only the Java one, which most likely will redirect you to Oracle.com if your browser blocks the plugin. The idea is to restore the HTTP download option on FileConnect. ...
Idea by Shulk | 16 May 2013 | 7 comments
iGoat v2.0 ( https://www.owasp.org/index.php/OWASP_iGoat_Project ) is a program that demonstrates common iOS mobile application security weaknesses and their remediation.  There are other resources that show the use of this tool. One example, ...
Blog Entry by Michael D Smith | 13 May 2013 | 1 comment
Let’s face it users cannot be trusted to know their entire password, I am not talking about the user that writes down their passwords on sticky notes the bad guys would need physical access to actually access those. What I am really speaking to how ...
Blog Entry by Joseph.Rogalski | 29 Apr 2013 | 9 comments
  Hola a tod@s; Inicio con la siguiente pregunta: ¿los algoritmos criptográficos actuales se basan para obtener las claves en la dificultad para factorizar un número entero en varios primos unicos y de multiplicidad uno? Este número entero está ...
Idea by calygula | 28 Apr 2013 | 0 comments
Follow Managed PKI on Twitter @SymantecMPKI Symantec would like to announce the release of Managed PKI Service v8.8, which includes support for the newest platforms and browsers, local key escrow and recovery service, and features to ...
Blog Entry by Teresa Law | 26 Apr 2013 | 0 comments
I’m optimistic on the current trends in security. The concepts of “intelligence” and “big data” have to potential to shift focus to counter the current threat landscape of intentional attacks to steal or destroy valuable information. Additional focus on ...
Blog Entry by PaulTobia | 18 Apr 2013 | 0 comments
Follow Managed PKI on Twitter @SymantecMPKI Symantec would like to announce the release of Managed PKI Service v8.8, which includes support for the newest platforms and browsers, local key escrow and recovery service, and features to address ...
Blog Entry by MelanieLopez | 16 Apr 2013 | 0 comments
One of the biggest problems information security encounters is either the perception or reality of slowing down the business. I’ve encountered this myself in my career.  One of the ways I dealt with this problem is through an effective use of the risk ...
Blog Entry by Phil Harris | 16 Apr 2013 | 0 comments