Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations
Showing posts tagged with cyber security
Showing posts in English
James Hanlon | 08 Dec 2014 | 0 comments

Turning data into intelligence is a prerequisite in these highly uncertain times, because not only does that empower organisations of all shapes and sizes to address today's cyber security challenges, but it also accelerates their ability to enable the innovation and agility of their businesses moving forward.

Intelligence is a critical asset for any business. Intelligence that enables better defence from today’s digitized threats we call “cyber intelligence”. This intelligence should not just be limited to the way we manage our data or technology but also the way we can apply better cyber intelligence to our processes and how we enable our people to be more cyber aware.

Let’s consider some of the challenges enterprises face and why better cyber intelligence matters so much.

First, digitisation is driving a new horizon for people and businesses. Software is intertwined in our daily personal and business lives – from checking email, to booking flights, to your...

Ilias Chantzos | 19 Aug 2014 | 0 comments

Cyber security as a political issue? Undoubtedly. What makes it so is that governments and politicians at large recognise national interest is heavily impacted by the influence of cyber – now generally used to refer to all automated or computerised systems, in terms of both hardware and software – because cyber is the horizontal element that underpins economic life.

With globalisation enabled by transport technology, communications technology and global markets, and cyber used so widely within the economy and our personal lives, its reach extends deep into the political landscape. Cyber runs our economy, it can be used to reach large amounts of the population, for committing crime, be weaponised and it affects national security – and therefore the state – at its core. All of which means that it has a direct impact on public interest and therefore attracts political attention.


Paul Wood | 14 Jul 2014 | 0 comments

Trends are complicated things. Consider, for example, the threat often called Ransomware. In our annual Internet Security Threat Report, all signs were that it was following a steady growth path which would continue into 2014. However, more up to date intelligence (as documented in our May 2014 Intelligence Report) suggests otherwise. It remains to be seen if the threat is cyclic, so we shall continue to watch with interest.

So, what gives? To understand Ransomware, we need first to understand how and why it emerged. Before Ransomware another form of extortion was prevalent, called Fake Antivirus (Fake-AV, or rogue security software). This would find its way onto a victim’s computer through email, website drive-by or other means, and then...

msmart007 | 05 Jun 2014 | 0 comments

In a previous blog, I described a number of dilemmas around cybersecurity - notably how its presence as a board room topic sits uneasily with the IT department’s poor perception of security, which couples with an increasing realisation that cyber threats cannot be addressed with IT alone. Even as technology becomes intrinsic to business life in this, hyper-connected world, the bad guys are developing ever more targeted threats as we see in our recent Internet Security Threat Report (ISTR).

It’s not up to us security experts to rain on this parade or tell the businesses we advise they’re doing it all wrong - I doubt they would listen even if we did. Our enterprise customers tell us their businesses wouldn’t be where they were today without taking risks, be they financial, organisational or indeed...

Mark Nutt | 19 May 2014 | 0 comments

They are young, bright, vibrant, talented and the task they have been handed is a daunting one: pitting their wits against an enemy that is growing rapidly in number, sophistication and daring -– an enemy that operates unseen in the dark areas of the Internet, from right across the globe. They are the formidable Cyber Threat Operations team put together by professional services firm PwC to take on the cyber criminals.

The dynamic of a ‘boots on the ground’ incident response team at PwC, under their leader Kris McConkey, 32, conjures up an exciting image of a crack squad, battling against the cyber underworld. The reality may often be more prosaic, but there’s no denying the significance of the task that these cyber crime fighters have taken on as they track down the perpetrators. These increasingly sophisticated and highly organised groups of assailants are now rapidly becoming a threat to businesses everywhere.

Kris’ team is part of a large and rapidly growing Cyber...

James Hanlon | 15 May 2014 | 0 comments

Cyber security incidents happen every day. They have become inseparable from our everyday business lives. Some you will be able to identify and deal with easily, with no significant damage. Others have the potential to severely disrupt and damage your operations.

However much we may wish there was a silver bullet that could target and eliminate such threats, it isn’t going to happen. The reality is that cyber threats and attacks are here to stay, growing in sophistication and frequency, with no one outside of, or safe from, their reach.

Rather than hoping an attacker might bypass your business (everyone is a potential target in this cyber-connected world), you need to have a Cyber Resilience Strategy firmly in place to protect you. That means identifying the important incidents, and ensuring the business remains effective and up and running throughout any attack. But what does ‘effective’ mean in this case? It means having deep visibility across an organisation into...

msmart007 | 06 Mar 2014 | 0 comments

Cyber attacks are headline news everywhere we look, highlighting companies that have been brought to their knees by such assaults, while independent organisations like the World Economic Forum and Lloyds are publishing business risk registers where Cyber Risk is now in the top 10 (Lloyds Risk Register has it at number 3).

It’s this type of daily bombardment that is putting Cyber top of mind. This is a good thing. Because, if that gets the attention of businesses and has them rushing to respond, then at least those horror stories are serving a useful purpose. But sometimes it’s hard to respond to requests from the board to demonstrate the value that IT brings or to articulate your organisation’s Cyber Risk posture in the language that business understands. At the same time, loading up your systems with technology that’s designed to keep the cyber criminals out is not the solution. Nor is the assumption that IT can keep your business safe the best way forward. Because, no...

James Hanlon | 17 Jan 2014 | 0 comments

FireEye’s recent acquisition of incident response and forensics specialist Mandiant for around $1 billion has been a real high profile eye catcher. The move greatly broadens the FireEye product and services portfolio, of course, although the cost of the acquisition has sparked a few mutterings of ‘overpriced’ amongst the analyst community. That said, several analysts cited Mandiant’s service revenues as a great addition to FireEye and it’s hard to argue with that.

Certainly, Mandiant is a good complement for FireEye, strengthening its security intelligence capability and increasing its detection capability at the endpoint (albeit not its endpoint protection capability), while also providing FireEye with a services arm.

Possible issues? Perhaps around efficient integration & synergies between the two technology platforms, although the two companies have held a relationship since 2012. What is possibly more of concern is the differences between the companies in...

Carey Nachenberg | 21 Nov 2013 | 0 comments

This blog will discuss a vision for ‘to-be state’ of enterprise security and targeted attack protection, and is the last part of this blog series.

In my last blog, I detailed the first step toward achieving our vision for enterprise security. To summarize, I proposed that we need to update our existing security products so they generate a steady flow of security-relevant telemetry (e.g., every login, failed or not, between every machine in the enterprise, metadata for every inbound email, every connection through the firewall, etc.) – even when that telemetry doesn’t appear directly related to an in-progress attack at the time it’s collected. This telemetry will be used in two...

Carey Nachenberg | 13 Nov 2013 | 0 comments

In my previous blog I talked about the as-is state of enterprise security. Now I’d like to paint a picture of a much better future state that I believe is achievable, and then I’ll tell you how we can make that state a reality.

First, in our ideal future state attackers don’t just go away, and let’s be honest, regardless of how advanced our defenses become, attackers will still find a way to penetrate them. So in our future state, we will not totally eliminate compromises – they will occur. However, we envision a future state where enterprises will either block the attacks outright, or discover them within minutes or hours of compromise, rather than the months or years it takes to detect many attacks today.  We further envision a future state where enterprises won’t need an expensive team of security experts or large numbers of proprietary integrations to achieve this level of protection. We envision a state where the...