Video Screencast Help
Security Community Blog
Showing posts in English
Todd Y | 13 Oct 2013 | 0 comments

Whether we're discussing an employee with the desire to steal data for personal gain, fulfill a vendetta or they just don’t know better, the results are the same.  What's at risk is damage to brand, customer loyalty, revenue, pipeline, etc.   While the threat of a Malicious Insider is nothing new.  What is new or at least changing is the attack vectors and gaps in security being exploited.   An examination of the most recent breaches clearly shows they are becoming more frequent and more damaging.  

Take for instance the Snowden breach.  Snowden was a trusted insider who successfully circumvented some of the tightest security in the world and walked out of an NSA facility with a thumb-drive full of classified information.  The sexy story to tell would be that he is a world class spy or hacker that gained access to sensitive documents.  The reality is, he simply exploited the permissions and privileges he had...

mike_ball | 10 Oct 2013 | 0 comments

The Concept of Zero-Trustzero-trust.png

 

( republished from http://security-musings.com )

 
 
 
To allow for near-future work models, where employees can bring their own mobile devices into the workplace,  where “work from home” is standard practice, and where the Data Center is being virtualized and services abstracted to external third party providers,  the Security Industry is rethinking the traditional concepts of  boundaries and perimeters.
 
 
The ...
Avkash K | 08 Oct 2013 | 0 comments

Hi All,

Just wandering over i came through one presentation by Dean Fox, VP, URS.

I really felt this would be very helpful to share this with you all to have the outlook of the today's cyberworld.

Also how the today's technology is contributing the same.

Any Security person must go through this article ones atleast.

 

Hope you all will enjoy this.

 

Thanks to URS for this.

Spencer Parkinson | 02 Oct 2013 | 2 comments

Information Security™ magazine and SearchSecurity.com recently announced the winners of its 2013 Reader’s Choice Awards, which were selected based on feedback by customers who were asked to assess products deployed within their organizations. We’re excited to announce that Symantec was honored with eight awards – four Gold, two Silver and two Bronze –demonstrating significant representation across our diverse portfolio of market-leading security solutions.

Included below is a complete list of Symantec’s wins, which will be featured in the October edition of Information Security magazine and are highlighted online at SearchSecurity.com.

The Information Security magazine and SearchSecurity.com 2013 Readers’ Choice Award winners were selected based on extensive, in-depth discussions and...

jjesse | 27 Sep 2013 | 0 comments

The Problem:

Currently within the DLP System there is no way to change a group of agents automatically, the only way is to do this manually through the Enforce Management Console. If you have a large number of agents this needs to be perfomed on it can be tedius. 

In the Management Console navigate to System -> Agents -> Overview and then select the computers you want and under the Actions menu you can change the Endpoint Server these computers communicate with.

Once again this is a bit tedious.

 

The Solution:

The update_configuration.exe file that is included in the SymantecDLPWinAgentTools_X.zip file can solve this problem.  The update_configuration.exe file needs to be in the same location as the Endpoint Agent is installed.

To change the DLP Endpoint Agent server:

  1. Verify the update_configuration.exe file is in the same location as the agent installed
  2. Execute the following command...
riva11 | 20 Aug 2013 | 0 comments

A nice  resource to test your password is the website TestYourPassword. In a simply interface you can test your passord and see if a psword can be defined weak, good or strong.

In the main page you can find also a function to generate a new strong password and if you are interested to know how a password is cracked there is nice video to explain how hacker scan a network for weak passwords and crack them.

TestYourPassword.jpg

Link : TestYourPassword

 

See also the article : How to test your passwords

Mithun Sanghavi | 20 Aug 2013 | 2 comments

Hello,

My name is Mithun Sanghavi and I am part of the Technical Support organization at Symantec. I’m sure you have had a few “How do I..." or "Where can I find...?” kind of questions about Symantec Endpoint Protection. This blog is to assist Symantec Endpoint Protection users with answers to these questions.

First off, I want to introduce you to SymWISE. This is our new product support knowledge base. It is available for our users and partners. This system is an online resource for support information for all Symantec products. SymWISE is one component of a larger effort to provide online resources and self-service options for our users and partners.

Content includes:

  • Best practices
  • Downloads
  • How to instructions
  • Technical product information
  • Troubleshooting tips

SymWISE features a search engine to help you find the information you need for any Symantec...

darci_hunt | 14 Aug 2013 | 0 comments

Today, nearly all of an agency’s mission-critical functions depend on safe and secure information technology systems. With cyber threats ever evolving and growing at an exponential rate, and increased reliance on technology to deliver core services in government, a robust cyber defense is needed by agencies.

Continuous Monitoring is certainly not a new term, but if you were to ask 10 people how they would define this term, you’re likely to get 10 different responses. Ken Durbin, Cyber & Continuous Monitoring Practice Manager, Symantec, provided expert insights on Symantec’s view of Continuous Monitoring and how agencies are adopting continuous monitoring programs as a means to protect government data and infrastructure. Durbin also highlights the benefits, best practices and challenges to adopting a continuous monitoring program.

Continuous monitoring is one part of a six-step process in the NIST Risk Management Framework (RMF), from NIST...

Tariq Naik | 06 Aug 2013 | 0 comments

This article is written based on wide spread Internet reports from Black Hat Conference at Las Vegas.

Recent advances in math and cryptology research in the academic field indicate that there might be mathematical algorithms or solutions in place to break RSA and Diffie-Hellman based encryption without obtaining the secret key and without the need of massive computing resources for significant durations of time within the next four to five years. These encryption schemes are widely on the Internet today for keeping sensitive date private right from encrypting Internet communications used for electronic commerce to securing software updates to encrypting global corporate and government networks.

The key to the security today is that there are no practical ways or efficient algorithms which can break these encryptions without obtaining the secret keys. The day such algorithms are found the encryption and hence the trust on which the Internet works will be broken.

...
Kari Ann | 05 Aug 2013 | 1 comment

 

SC Magazine conducted a group test of endpoint security products and reviewed Symantec Endpoint Protection 12.1.2 in the August 1, 2013 issue. Symantec Endpoint Protection 12.1.2 received a very positive review, receiving an overall rating of five out of five stars in this important trade publication. The review specifically called out SEP’s protection of millions of endpoints, SONAR engine, Insight technology and intuitive usability, concluding that, “Symantec has put together a solid product.” The full review can be read here

.scMag3.ashx__0.jpg