Video Screencast Help
Symantec Analyst Relations
Showing posts tagged with General Symantec
Showing posts in English
John_Brigden | 19 Sep 2012 | 0 comments

Clouds are a law unto themselves. They float freely, without regard for geographic, political or national demarcation lines. With a fair wind at their disposal, they can go more or less wherever they please. Of course, you could also argue that they are at the mercy of the elements and that these control their every move.

Which creates a clever analogy with cloud computing. Should it be allowed to ‘wander’ wherever it might please, without restriction, or should there be forces in place that dictate how and where they may operate?

It’s a big question and there are big numbers involved, with the market for cloud computing having surged in recent years. Market research firm IDC expects businesses worldwide to spend $28.2 billion on cloud services this year alone, up from $21.5 billion in 2010, with spending forecast to more than double to $57.4 billion by 2014.

Right now, the European Commission is knee deep in finalising a strategy on cloud...

Symantec Analyst Relations | 12 Sep 2012 | 0 comments

The August edition of the Symantec Intelligence report provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this report includes data from May 2011 through August 2012.

Report highlights

  • Spam – 72.3 percent (an increase of 4.7 percentage points since July)
  • Phishing – One in 312.9 emails identified as phishing (an increase of 0.109 percentage points since July)
  • Malware – One in 233.1 emails contained malware (a decrease of 0.14 percentage points since July)
  • Malicious Web sites – 1 website blocked per day (a decrease of 49.8 percent since July)
  • The state of data breaches to date in 2012
  • A look at a malicious email scam that pretends to come from Symantec
  • A new Java zero-day vulnerability appears in...
Symantec Analyst Relations | 08 Aug 2012 | 0 comments

The July edition of the Symantec Intelligence report provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this report includes data from January through June 2012.

Report highlights

  • Spam – 67.6 percent (an increase of 0.8 percentage points since June)
  • Phishing – One in 475.3 emails identified as phishing (a decrease of 0.003 percentage points since June)
  • Malware – One in 340.9 emails contained malware (a decrease of 0.023 percentage points since June)
  • Malicious Web sites – 2,189 Web sites blocked per day (an increase of 4.0 percent since June)
  • Olympic related scams and threats to keep an eye on
  • Web attack toolkit activity in the first six months of 2012
  • A roundup of the best blogs of the last month...
Neal Watkins | 22 Jul 2012 | 0 comments

St. Paul’s Cathedral has dominated the London skyline for more than 300 years, while almost everything around it has changed. From the street to the Shard, the traffic to the tourists, it’s all new, while the Cathedral has stayed the same. The same is true of the data that dominates our lives.

Although you might think data is constantly changing, it remains the one invariable in a dynamic IT landscape. Anyone the wrong side of 40 will remember the different eras of IT. First we had the mainframe period, then the dawn of the PC, followed by the brief, bright light of client/server computing. Next came the Internet and collaborative computing. Throughout the last 30 years, the bedrock of all those eras has been data. Yes, there’s more of it—unstoppable amounts in fact—but it’s always been there, always needed to be protected, secured, and kept available.

Right now, we’re in the post-PC era, where everything is Cloud-enabled, and...

GregDay-SecurityCTO | 10 Jul 2012 | 0 comments

Attacks by viruses, trojans and other malware have often been considered as a Microsoft problem. Whilst Microsoft may have initially been slow to realise the significance and impact of malware, with  Windows XP Service Pack 2 and Microsoft’s Trustworthy Computing initiative, led by a former FBI agent, that the company started to get on top of the challenge.

Despite what the anti-Redmond crowd have blogged over the years, however, hackers didn’t target Microsoft products exclusively because they were insecure, or because the people involved had some ideological death-wish on the company. No – they did it because Microsoft was the most used end-point device environment in the world. Bill Gates’ “Windows Everywhere” ambition, once realised, made it the most obvious of all targets.

When times change, however, they don’t necessarily follow the script. In the personal computer era, the debate was about whether Linux (and more...

Orla Cox | 04 Jul 2012 | 0 comments

Much has already been written about the ongoing analysis into the code, sources and likely consequences of the 'Flame' or 'Flamer' malware program. Even at this early stage however, there's one aspect that continues to set it apart: its complexity.

W32.Flamer, to give the malware its technical name, is over 20MB in size - which makes it an order of magnitude bigger than its contemporaries. Our analysis to date has revealed that it contains a number of self-contained modules including screen capture, database management, Bluetooth, secure transmission and even self-destruct capabilities.

While its role as a targeted espionage tool is already evident, some purposes of this particular piece of malware are still to become clear.  It appears extremely well...

Symantec Analyst Relations | 26 Jun 2012 | 0 comments

By Francis deSouza, Group President, Enterprise Products and Services

This blog was originally posted in Information Unleashed: The Official Voice of Symantec

With every ring of its cash registers, Tesco is getting smarter. Each month the company collects billions of pieces of information on its customers’ shopping habits and uses them to adjust its promotions and pricing, giving the company a huge competitive advantage. In essence, this British retail giant is harnessing the power of data analytics in order to help put the “I” back in Information Technology.

And Tesco is not alone. From confidential customer data to intellectual property to financial transactions, organizations possess massive amounts of information that not only enable them to be productive and competitive, but also grow their business.  In fact,...

Symantec Analyst Relations | 25 Jun 2012 | 0 comments

By Patricia Titus, Vice President and Chief Information Security Officer

This blog was originally posted in Information Unleashed: The Official Voice of Symantec

Security leaders have come a long way, from backroom IT gurus to earning a seat at the executive table. Today, boardroom discussions increasingly focus on security threats and risk management and CISOs are being asked by the CEO “How secure is our online e-commerce site?” or “Are we at risk of being attacked by hackers?”

As a security leader, your answer to these questions can determine whether you get the resources and support needed to manage the risks to your organization. Therefore, the ability to answer these kinds of questions in a way that resonates with business executives is critical.

To do this, you cannot rely on the technical dashboards of IT GRC solutions past. While...

Marie Pettersson | 15 Jun 2012 | 1 comment

A few weeks ago I hosted a banking sector CIO Roundtable on the topic of mobile technologies and their impact, both inside the enterprise and in how banks engage with their customers. Of particular interest was the whole area of mobile payments - not least because there still appears to be so much to play for in this still-developing area. We've seen some fantastic success stories in both developed countries and developing nations, where mobile payments are fast be coming the 'de facto' mechanism for currency transfers (but not necessarily with a bank behind it). In western economies, the opportunity for banks is to provide better services than the competition, increasing customer satisfaction and encouraging upgrades to enhanced facilities. 

Mobile banking is not without its challenges, however. It is easy to think that smartphones are where the action is, yet many banking customers still have simpler phones with SMS alone. Equally however, the mobile...

Sarah Whipp | 13 Jun 2012 | 0 comments

 

In my first blog I talked about the importance of having good data that is coherent across teams and departments. While it’s inevitable that groups will choose reporting periods that show them in the best possible light, senior execs need a single view of the truth.

But what about planning? It is easy to create forward projections that are more optimistic than realistic, particularly in the current financial climate. While can be difficult to predict buying behaviours with any certainty, however, it should be more straightforward to present sensible worst-case scenarios. But is it?

A long time ago, when I was an idealistic young marketing exec, I prepared a detailed business plan for one if my managers. He looked it through and threw it back at me. “That's no good,” he said, “I need a better worst case scenario.” In other words, one which wasn’t quite as bad. At the time I thought that was the craziest expression I...