136 Results
Kevin Alejandro RoundyResearcher - Symantec
Posted: 3 Min Read

What We’re Doing to Fight the Scourge of Cyber Stalking

Here’s how we’re battling “creepware” to protect victims of stalking and intimate partner violence

What We’re Doing to Fight the Scourge of Cyber Stalking
Chris ChowSecurity Awareness Manager, Digital Trust and Safety
Posted: 5 Min Read

Phishing for a Proactive Security Culture

How to drive a measurable reduction in security risk using phishing simulations

Video
Phishing for a Proactive Security Culture
Michael SmithAmericas Incident Response, Symantec Cyber Security Services
Posted: 3 Min Read

Best Practices in Targeted Ransomware Attacks

Against the backdrop of increasing attacks, here’s how to prepare with a bold response playbook and ransomware jump kit

Best Practices in Targeted Ransomware Attacks
Andrew BoreneSenior Director, Federal – National Security Group Symantec
Posted: 3 Min Read

Strengthening National Security through Public-Private Partnerships

Here’s how the National Security Group at Symantec is working with Uncle Sam to help protect its far-flung data networks

Strengthening National Security through Public-Private Partnerships
Leonid BelkindVice President, CTO – Zero Trust, Secure Access Cloud
Posted: 4 Min Read

Not All Data Is Created Equal: Data vs. Actionable Data

Enterprise security is hampered by a preoccupation with collecting data. The focus should be on extracting information to collect actionable data

Video
Not All Data Is Created Equal: Data vs. Actionable Data
View More