Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts in English
nisharamach | 18 May 2014 | 0 comments

Join Symantec Security Response expert, Kevin Haley, for a Tweet Chat on Friday, May 23 at 11 a.m. PT / 2 p.m. ET to talk about  key trends highlighted in Symantec’s recent Internet Security Threat Report (ISTR), Volume 19.

The ISTR, which covers the major threat trends observed by Symantec in 2013, highlights how cybercriminals unleashed the most damaging series of cyberattacks in history – ushering in the era of the “Mega Breach.”

How do these breaches impact you and your company? Find out. Mark your calendars to join the #ISTRTALK chat and plan to discuss the latest attack vectors and techniques used by cybercriminals to gain access to your data.

Topic: Internet Security Threat Report: Volume 19 – What are the odds of your company getting attacked?

Date: Friday May 23, 2014

Time: Starts...

vgtero | 05 May 2014 | 0 comments

Symantec Vision 2014 has finally arrived and we are excited to welcome all of our attendees! This week’s event offers four days of face-to-face insights, information, and experiences you can use to secure your organization.   

On Wednesday, May 7, we are offering a hands-on lab session to highlight the new capabilities of Symantec Control Compliance Suite Standards Manager 11.0.5, which started shipping on April 15, 2014.   Lab 1381- Enhance Asset Discovery and SCAP 1.2 Compliance for Continuous Monitoring with CCS Standards Manager, will demonstrate how CCS Standards Manager's new network and asset discovery capabilities and SCAP 1.2 support enhances your continuous monitoring objectives. (Lab 1381, Wednesday, May 7, 2-3 pm, Milano 1). 

Control Compliance Suite...

khaley | 05 May 2014 | 1 comment

Hear the word flimflam and you think of a time of straw hats and cardboard suitcases; of grifters pulling into town to take the rubes with patent medicine, three-card monte and the old pigeon drop con.

It would be nice to think that these words don’t get used today because we’ve become so much smarter.  We have information at our finger tips.  We are too smart and sophisticated for flimflam, grifts, ruses, hustles, swindles or bunko to work on us. 

Of course that’s not true.  Words just fall out of fashion.  Today we call them scams and cons.  And while we might be more sophisticated than we were, we remain human and human nature remains just as exploitable as it was a hundred years ago.   Oh, and the Flimflammers have gotten more sophisticated too. They’re now using computers.

Using the Internet to run scams makes sense.  Con is short for confidence.  And where better to gain confidence than among friends and...

vgtero | 02 May 2014 | 0 comments

A new report from the Ponemon Institute, “Exposing the Cybersecurity Cracks: A Global Perspective,” concludes that global security professionals find themselves “deficient, disconnected, and in the dark” in combating cyber threats.

Despite the fatalistic tone in this report, I don’t believe that as security pros, you are the type who would just shrug your shoulders, say “cie la vie”, continue with business-as-usual, and hope for the best. As security professionals, you are excellent at problem solving and thrive at these challenges! You are probably in the midst of figuring out strategies or executing plans to address these deficiencies and remove these feelings of “security inadequacies”.  Many of you are multi-taskers, shoring up your organization’s security and risk management capabilities; at the same time, executing transformative activities such as migrating applications to a software-defined environment. 

At Symantec, we continue to develop solutions...

Lion Shaikh | 28 Apr 2014 | 0 comments
Sr. No Blank Field Type Reason
1 Destination HTTPS/SSL In endpoint Incidents Destination field is used for file transfer incidents i.e.( where files are transfered from source to destination) and since https/ssl or http transactions do not have this information destination is only populated for CD/DVD & Removable storage Incidents. But still we get the destination URL for http/s incidents which is given in recipient field.
HTTP
       
2 Destination Path CD/DVD For CD/DVD Incidents destination path would be CD/DVD Drives and since at the time of writing the files on CD/DVD drives they become un-readable for the internal applications due to which DLP is unable to monitor/ keep track of...
Sym_Chris | 28 Apr 2014 | 0 comments

Top Issues!

In one of our previous blogs (https://www-secure.symantec.com/connect/blogs/symanteccloud-support-blog), we looked at the top issues our customers are raising with Symantec.cloud support. In April, these issues remained in the number one and two slots. Firstly, the Submission of Spam Samples. Many of our customers are now using the Symantec Email Submission Client, installed on their Exchange environments. This tool allows users to submit spam samples directly to our analysis teams, without the need to raise a support case. It really is helping us to help you, so if you aren't using it already, head over to the Downloads section of our customer portal and download the file. It's a quick and easy installation, and a very lightweight add-on.

We're also continuing to see Email Delivery issues as a very common...

James Hanlon | 25 Apr 2014 | 1 comment

The Executive Briefing Center (EBC) for many years has worked with EMEA’s key customers to define their security strategies and demonstrate how Symantec’s solutions can help them meet their business needs.  

With the launch of CyberV Enterprise Assessment (EA) service, the EBC will now act as the CyberV center of excellence (CoE) offering not only the ability to deliver the CyberV EA service for Symantec's customers but also providing complete 'Cyber Customer Experiences' by combing the CyberV assessments with Symantec Security Operation Centre (SOC) tours and cyber solution briefings. 

The CyberV EA service leverages the latest global thought leadership within the area cyber resilience and combines it with Symantec's own cyber insights to provide a 'snapshot' assessment of a customer's current and desired level of cyber resilience. The Cyber EA service provide great value for customers by assessing capability around the four cornerstones of cyber resilience...

riva11 | 24 Apr 2014 | 0 comments

Keeping your web browser up to date is very important for your own safety and security, but also it is important to install the latest add-ons whenever new versions become available.

What is a plugin?

  • Plugins power videos, animation and games
  • They're built outside of Firefox by companies like Adobe Systems and Apple
  • Plugins don't always update automatically.

Why should I update my plugins?

  • Old plugins can interrupt browsing and waste your time.
  • Old plugins increase your risk for attack by malware, viruses, and other security threats.
  • Updated plugins have improvements that make the web better and safer for you.

A simple way to check if you always have running the latest plug-ins is visit the Mozilla Plugin Check & Updates .

Also, if you...

vgtero | 24 Apr 2014 | 0 comments

With the recently discovered Heartbleed vulnerability, information security professionals and end users are feeling the pressure and impact to better protect their information. The task of securing your organization and information can seem overwhelming.

Don’t miss out on this webcast to get step-by-step instructions on how to protect your business and information, and keep your communications secure. 

Join Us To Learn About:

  • What is Heartbleed and the impact it has
  • Understand how the vulnerability is exploited and how you can detect it
  • Steps you need to take to secure information now and going forward

Register at:  https://symantecevents.verite.com/31175/241406

BalaP | 17 Apr 2014 | 0 comments

Symantec has released Endpoint Protection 12.1.4.1a (12.1.4.4130).

This release resolves the Heartbleed OpenSSL vulnerability

http://www.symantec.com/docs/AL1555