Video Screencast Help

Search

Search results

2013 saw an increase in malware signed with valid code signing certificates. How did this happen? Are verified entities actually signing and distributing malware? That does not appear to be the case. Rather, the code signing private keys are being ...
Blog Entry by DeanJC | 14 Apr 2014 | 0 comments
This week a vulnerability dubbed “Heartbleed” was found in the popular OpenSSL cryptographic software library ( http://heartbleed.com ).  OpenSSL is widely used, often with applications and web servers like Apache and Nginx.   OpenSSL ...
Blog Entry by Tom Powledge | 11 Apr 2014 | 9 comments
If you need an SSL certificate to protect your website or some other business-critical application such as email or storage systems, then you need to remember your ABCDs. A is for the Appropriate certificate There are a few different types ...
Blog Entry by Elliot_Samuels | 04 Apr 2014 | 1 comment
‘The attacker still has the upper hand,’ says the Dutch government’s most recent Cyber Security Report . The report continues: attackers are getting smarter, more devices are being connected to the internet and yet many incidents could have been ...
Blog Entry by Jane Broderick | 26 Mar 2014 | 0 comments
Many organizations today rely on passwords as the foundational layer of security for access to sensitive business data. With the rapid growth of smartphones and tablets, expanding use of cloud services, and nearly ubiquitous mobile workforce, passwords ...
Blog Entry by MelanieLopez | 03 Apr 2014 | 0 comments
This is the final part of a four-part series covering twelve fundamentals for choosing a managed PKI solution, and questions to ask in the buying process. In part 3 of our PKI blog series, we identified several features that simplify ...
Blog Entry by MelanieLopez | 24 Mar 2014 | 0 comments
The Symantec Validation and ID Protection Service (VIP) Enterprise Gateway v9.4 has been released, featuring a newly branded user interface, co-branded self-service portal login page, and LDAP synchronization enhancements. Feature Highlights ...
Blog Entry by MelanieLopez | 24 Mar 2014 | 0 comments
このブログではウェブサイトやその上で動作しているウェブアプリケーションの脆弱性について紹介すると共に注意喚起をする目的でまとめられています。 今回は2005年以来継続して攻撃被害のあるSQLインジェクションについて解説をしています。 ※なお、内容に関しましてはHASHコンサルティング株式会社の徳丸 浩様に監修いただいています。   +++++++++++++++++++++++++++++++++++++++++++++++   ...
Blog Entry by Masato Hayashi | 07 Apr 2014 | 0 comments
This is the third part of a four-part series covering twelve fundamentals for choosing a managed PKI solution, and questions to ask in the buying process. In Part 2, we shared  three key differences  between Symantec and other managed public ...
Blog Entry by MelanieLopez | 13 Mar 2014 | 0 comments
プッシュ認証技術を採用した Symantec Validation and ID Protection Service(VIP)の最新バージョンをご利用いただけるようになりました。プレスリリース「 Symantec Validation and ID Protection(VIP)に新機能が追加 」をご覧ください。 機能の概要 データ侵害が増加する一方で、脆弱なログイン情報の盗難が後を絶たないことから、犯罪者からオンラインデータを保護するために、2 ...
Blog Entry by MelanieLopez | 10 Mar 2014 | 0 comments