Video Screencast Help

Search

Search results

Durante mes de enero pasado llegó un momento en el que parecía que no íbamos a poder dejar de contar. Habíamos comenzado a recolectar datos sobre las brechas de seguridad en 2013. En cierto punto parecía que ese año sería como otros y con números muy ...
Blog Entry by Kevin Haley | 07 Apr 2014 | 0 comments
At one point, it seemed like we might never be able to stop counting. It was January and we had begun to collect data on breaches from the previous year. Up to that point, it had been an unexceptional year, as far as breaches go, with numbers in line ...
Blog Entry by Kevin Haley | 01 Apr 2014 | 0 comments
In my predictions for 2014, I renamed the Internet of Things as the “Internet of Vulnerabilities.” It’s not my intention to demonize the Internet of Things. We are going to see some amazing technology and real-world solutions brought forth by having so ...
Blog Entry by khaley | 04 Feb 2014 | 0 comments
Pulse Weight Time slept Steps taken Glucose levels Blood pressure Exposure to sunlight Time spent brushing your teeth Pretty soon, the information above is going to be floating around the Internet. By that, I mean your ...
Blog Entry by khaley | 04 Feb 2014 | 0 comments
Whispers. The secret to predicting the future is to listen for the whisper. By the time you’ve heard things in a loud, clear voice they have already come true. I’ve been listening to the whispers in 2013 and have a pretty good idea for what we’ll ...
Blog Entry by khaley | 19 Nov 2013 | 0 comments
  Defending against sophisticated targeted attacks is now the norm, and it’s not just large companies that are being impacted. These state-sponsored attackers are going after smaller companies now too.  Why is that?  Well, small companies often have ...
Blog Entry by Steve Trilling | 15 Nov 2013 | 1 comment
Now is not the end. It is not even the beginning of the end. But it is, perhaps, the end of the beginning. Apologies to Winston Churchill, but recent events make this quote seem quite appropriate. Despite the initial hype, Flamer does not ...
Blog Entry by khaley | 29 Jun 2012 | 0 comments
  By Brian Burch, vice president of marketing communications, Symantec We’ve all heard about how regular forest fires clear the way for new life, making a healthier ecosystem overall. And if there is a silver lining to be found in the ...
Blog Entry by Symantec Corp. | 13 Jun 2012 | 0 comments
  In a recent court case U.S. v. David Nosal, Judge Alex Kozinski ruled that the Computer Fraud and Abuse Act (CFAA), the nation’s anti-hacking law, applies to people accessing data by circumventing technological access barriers, but it does not ...
Blog Entry by Tim_Matthews | 12 Jun 2012 | 1 comment
This blog is the first in a regular series of posts that spotlight how you can manage the kaleidoscope of change taking place right now in your organisation. No matter who I talk with at the moment, be it customers, analysts or press, the ...
Blog Entry by John_Brigden | 07 Jun 2012 | 0 comments