Video Screencast Help

Symantec Analyst Relations

Showing posts in English
Symantec Analyst Relations | 12 Jul 2012 | 0 comments

By John Brigden, Senior Vice President, EMEA

This blog was originally posted in Information Unleashed: The Official Voice of Symantec

The dramatic news that one of the U.K.’s leading financial services organisations had suffered a data outage that led to millions of customers unable to access their accounts should be a wake-up call for every CIO. The event tells them that their operation is entirely dependent on IT and in particular on the IT resources they have to run their systems.

Read the blog here

khaley | 11 Jul 2012 | 0 comments

 

The furious discussion about the appropriateness of the term Advanced Persistent Threats (APTs) has finally died down and many people are now gun shy about using it. I’m okay with that.  I completely agree that the phrase was overused and over applied. But that doesn’t mean we should bury the term.  First we should properly define it.  Symantec has done that here.  Next, I’m going to go out on a limb and actually praise the use of the term APT.

So what’s to praise about the term APT?  Two things.  First, it was an extremely effect way of getting the attention of people who have for years been ignoring the risk of targeted attacks.  We were able to advance the conversation and get companies out of the mind-set that targeted attacks were something that happened to other people.  If you’re one of the ones that still need proof take a look at the data we...

GregDay-SecurityCTO | 10 Jul 2012 | 0 comments

Attacks by viruses, trojans and other malware have often been considered as a Microsoft problem. Whilst Microsoft may have initially been slow to realise the significance and impact of malware, with  Windows XP Service Pack 2 and Microsoft’s Trustworthy Computing initiative, led by a former FBI agent, that the company started to get on top of the challenge.

Despite what the anti-Redmond crowd have blogged over the years, however, hackers didn’t target Microsoft products exclusively because they were insecure, or because the people involved had some ideological death-wish on the company. No – they did it because Microsoft was the most used end-point device environment in the world. Bill Gates’ “Windows Everywhere” ambition, once realised, made it the most obvious of all targets.

When times change, however, they don’t necessarily follow the script. In the personal computer era, the debate was about whether Linux (and more...

Orla Cox | 04 Jul 2012 | 0 comments

Much has already been written about the ongoing analysis into the code, sources and likely consequences of the 'Flame' or 'Flamer' malware program. Even at this early stage however, there's one aspect that continues to set it apart: its complexity.

W32.Flamer, to give the malware its technical name, is over 20MB in size - which makes it an order of magnitude bigger than its contemporaries. Our analysis to date has revealed that it contains a number of self-contained modules including screen capture, database management, Bluetooth, secure transmission and even self-destruct capabilities.

While its role as a targeted espionage tool is already evident, some purposes of this particular piece of malware are still to become clear.  It appears extremely well...

Symantec Analyst Relations | 26 Jun 2012 | 0 comments

By Francis deSouza, Group President, Enterprise Products and Services

This blog was originally posted in Information Unleashed: The Official Voice of Symantec

With every ring of its cash registers, Tesco is getting smarter. Each month the company collects billions of pieces of information on its customers’ shopping habits and uses them to adjust its promotions and pricing, giving the company a huge competitive advantage. In essence, this British retail giant is harnessing the power of data analytics in order to help put the “I” back in Information Technology.

And Tesco is not alone. From confidential customer data to intellectual property to financial transactions, organizations possess massive amounts of information that not only enable them to be productive and competitive, but also grow their business.  In fact,...

Symantec Analyst Relations | 25 Jun 2012 | 0 comments

By Patricia Titus, Vice President and Chief Information Security Officer

This blog was originally posted in Information Unleashed: The Official Voice of Symantec

Security leaders have come a long way, from backroom IT gurus to earning a seat at the executive table. Today, boardroom discussions increasingly focus on security threats and risk management and CISOs are being asked by the CEO “How secure is our online e-commerce site?” or “Are we at risk of being attacked by hackers?”

As a security leader, your answer to these questions can determine whether you get the resources and support needed to manage the risks to your organization. Therefore, the ability to answer these kinds of questions in a way that resonates with business executives is critical.

To do this, you cannot rely on the technical dashboards of IT GRC solutions past. While...

Neal Watkins | 19 Jun 2012 | 0 comments

Just what lengths will hackers go to? Multi-stage attacks based on a foundation of social engineering. At the beginning of this month, a hacker finally achieved his goal: to change the password on a customer account hosted by Web acceleration company CloudFlare, and change the customer's DNS records (LINK: http://blog.cloudflare.com/post-mortem-todays-atta...). 
 
The compromise was made possible through a separate hack, of the company CEO's personal Gmail account. This was achieved by compromising his mobile phone account, itself made possible by calling the AT&T support desk and impersonating the CEO, offering his social security number as proof of identity.
 
Armed with this information, the hacker was able to access the CEO's corporate Gmail account, and the rest is...

Marie Pettersson | 15 Jun 2012 | 1 comment

A few weeks ago I hosted a banking sector CIO Roundtable on the topic of mobile technologies and their impact, both inside the enterprise and in how banks engage with their customers. Of particular interest was the whole area of mobile payments - not least because there still appears to be so much to play for in this still-developing area. We've seen some fantastic success stories in both developed countries and developing nations, where mobile payments are fast be coming the 'de facto' mechanism for currency transfers (but not necessarily with a bank behind it). In western economies, the opportunity for banks is to provide better services than the competition, increasing customer satisfaction and encouraging upgrades to enhanced facilities. 

Mobile banking is not without its challenges, however. It is easy to think that smartphones are where the action is, yet many banking customers still have simpler phones with SMS alone. Equally however, the mobile...

Sarah Whipp | 13 Jun 2012 | 0 comments

 

In my first blog I talked about the importance of having good data that is coherent across teams and departments. While it’s inevitable that groups will choose reporting periods that show them in the best possible light, senior execs need a single view of the truth.

But what about planning? It is easy to create forward projections that are more optimistic than realistic, particularly in the current financial climate. While can be difficult to predict buying behaviours with any certainty, however, it should be more straightforward to present sensible worst-case scenarios. But is it?

A long time ago, when I was an idealistic young marketing exec, I prepared a detailed business plan for one if my managers. He looked it through and threw it back at me. “That's no good,” he said, “I need a better worst case scenario.” In other words, one which wasn’t quite as bad. At the time I thought that was the craziest expression I...

John_Brigden | 12 Jun 2012 | 0 comments

This blog is the first in a regular series of posts that spotlight how you can manage the kaleidoscope of change taking place right now in your organisation.

No matter who I talk with at the moment, be it customers, analysts or press, the message is the same: Bring Your Own Device (BYOD) is the hot topic. Challenges abound and people’s angst is rapidly moving beyond simply the device to the business: companies can only allow business to take place on the device if it is secure. According to the Symantec 2012 State of Mobility Survey of more than 6,000 businesses worldwide, most organisations are now commonly making line-of-business applications...