Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


older | 1 | .... | 138 | 139 | (Page 140) | 141 | 142 | .... | 254 | newer

    0 0

    On January 26, 2015, the Wall Street Journal reported that Google is dropping support for the default browser found in Android 4.3 or earlier, a move that stunned analysts. This means the company will no longer patch security holes in the Web browser included in some older versions of its Android operating software, leaving over 60 percent of its users at risk.

    For the roughly 20 percent of companies with employees that use the vulnerable operating systems[1] to conduct work, this is especially concerning. The decision will likely draw the attention of criminals and lead to a fresh wave of exploits targeting the unsupported devices.

    To address the problem, at-risk companies will ultimately need to update employee devices to newer versions of Android. In the mean time, however, to protect employees and their data from prying eyes, the article recommends companies should encourage the use of alternative browsers, essentially relying on the employee to fix the problem—a passive and shaky approach at best.

    A better idea is to tackle the problem from a mobile application management (MAM) perspective that focuses on controlling applications and the data those apps access or store, rather than the device itself. The technology allows IT to oversee the lifecyle of securing, distributing, and retiring apps of all kinds—including web apps—across the mobile device. By applying application-level policies to authenticate users and secure data, for example, IT can protect apps and data even in the face of a significant vulnerability such as Android’s.

    Leading MAM solutions offer a second powerful layer of security as well, in the form of application-wrapping. App-wrapping applies a management layer to a mobile app without requiring changes to the underlying code. This allows an administrator to set specific policy elements for corporate apps and data, such as preventing an app from storing data on a device or requiring users to re-authenticate periodically in order to keep using the app.

    Symantec™ Secure Web is one example of a wrapped app. A secure web browser that provides safe access to internal web-based applications and content, Symantec Secure Web protects companies from potential web vulnerabilities in older Android devices by granting employees access to internal web-based resources and apps. To protect data in transit, a secure app proxy serves as a virtual network gateway for incoming traffic. Administrators can apply data control policies, such as requiring internal URLs be opened with the Secure Web app, effectively disarming any hackers with their eye on your employees’ devices.

    Additional third-party wrapped applications are available to protect and enable the enterprise. The Symantec Sealed Program allows app developers to add security and management controls to their applications without making source code changes. Developers partner with Symantec to provide enterprise-ready apps that are invulnerable to hackers seeking access, even in unsupported Android devices.

    Symantec’s approach to mobile management empowers companies to embrace Android in the Enterprise, without having to worry about whether Google or anyone else is patching security vulnerabilities.


    0 0
  • 02/19/15--05:09: The Worst Passwords of 2014
  • SplashData has released its 4th annual annual list of the most popular worst passwords (Reference : Splashdata).

    The top 25 most commonly used bad passwords are:

    1. 123456 (Unchanged from 2013)
    2. password (Unchanged)
    3. 12345 (Up 17)
    4. 12345678 (Down 1)
    5. qwerty (Down 1)
    6. 1234567890 (Unchanged)
    7. 1234 (Up 9)
    8. baseball (New)
    9. dragon (New)
    10. football (New)
    11. 1234567 (Down 4)
    12. monkey (Up 5)
    13. letmein (Up 1)
    14. abc123 (Down 9)
    15. 111111 (Down 8)
    16. mustang (New)
    17. access (New)
    18. shadow (Unchanged)
    19. master (New)
    20. michael (New)
    21. superman (New)
    22. 696969 (New)
    23. 123123 (Down 12)
    24. batman (New)
    25. trustno1 (Down 1)

    "The bad news from my research is that this year's most commonly used passwords are pretty consistent with prior years,” said Mark Burnett,  online security expert and author of Perfect Passwords. Burnett collaborated with SplashData on the list.  "The good news is that it appears that more people are moving away from using these passwords."

    Other tips from a review of this year's Worst Passwords List include:

     - Don't use a favorite sport as your password – "baseball" and "football" are in top 10, and "hockey,""soccer" and "golfer" are in the top 100. Don't use a favorite team either, as "yankees,""eagles,""steelers,""rangers," and "lakers" are all in the top 100.

    - Don't use your birthday or especially just your birth year -- 1989, 1990, 1991, and 1992 are all in the top 100.
    While baby name books are popular for naming children, don't use them as sources for picking passwords. Common names such as "michael,""jennifer,""thomas,""jordan,""hunter,""michelle,""charlie,""andrew," and "daniel" are all in the top 50.

    Also in the top 100 are swear words and phrases, hobbies, famous athletes, car brands, and film names.
    This is the first year that SplashData has collaborated on the list with Mark Burnett, online security expert and author of "Perfect Passwords"

    If you are interested in comparing the situation of the worst passwords of the previous year, then it is available the following article : The Worst Passwords of 2013


    0 0
  • 02/19/15--07:03: Website Security made simple
  • Download Symantec's new eBook 'Website Security for Dummies'

    Website security is important for every business that has an online presence. Whether you’re in ecommerce or electricals, holiday cottages or hedge funds, your website is one of your most important business assets. It’s your 24/7 shop front, and you need to make sure it’s secure and working at its best.

    You wouldn’t leave your laptop behind when you leave a coffee shop, or your stockroom door wide open, so why would you take chances with website security?

    If your site triggers a security warning in the web browser of the visiting user or worse, it infects a customer’s computer, that customer is going to tell all their friends and colleagues and thanks to social media perhaps even the wider world. Ouch!

    And it’s not just your reputation that you have to worry about. If you have an ecommerce site, warnings and poor security will mean abandoned carts and lost customers. In a recent Symantec, online consumer study, 56 per cent of respondents go to a competitor’s website to complete their purchase and only 11 per cent go back to the first website after seeing a security warning (Symantec Online Consumer Study, March 2011).

    But website security can be a daunting topic, full of jargon and unfathomable workings. To get to grips with the why and what of website security, Symantec created an easy to read ‘How-To Guide’ for everyone who wants to learn more about website security in the world famous ‘For Dummies’ style. 

    15383-Dummies-375x375tw-V3.jpg

    Download the eBook here!

    “Website Security For Dummies” is your guide to understanding the risks posed by unprotected websites, the value of using SSL certificates and the what-and-how of different types of SSL certificates. You will learn how to:

    • Make the business case for website security
    • Understand the basics of SSL certificates
    • Choose and implement the right SSL certificate for your website
    • Follow best practice for maintaining a healthy and trusted website
    • Find useful sources for information on website security

    So relax, Symantec got you covered; soon you too will be an expert on website security.


    0 0

    The Dynamic Duo of Performance: Backup AND Recovery
    Twitter カードのスタイル: 
    summary

    A co-worker recently shared an article from Storage Magazine, “Enterprise data protection shopping lists focus on cost, scalability”. The article included a survey and there was one question I found interesting. It made me think of the NetBackup 5330 Appliance and the fact that it is specifically designed for performance, especially when it comes to recovery.

    In the survey, when asked what the most important factors were for evaluating and purchasing backup tech, 51% of respondents selected Recovery Time Objectives (RTO), the third most popular response. What was interesting was the #6 response - Recovery Point Objectives (RPO) with 39% respondents. 

    120px_Batman-and-Robin.jpgI liken the survey results of Backup and Recovery to Batman and Robin, both B&R. Recovery is often the overlooked partner of Backup. While Batman (Backup) may get top billing, people are realizing the importance of Robin (Recovery) and only having ½ of the dynamic duo (data protection) is not a solution. However, organizations are discovering that greater focus may be needed on recovery. In a disaster, recovery time is what gets the C level’s attention, and can make or break a career. Often your career.   

    We are addressing recovery time with the NetBackup 5330 appliance, an integrated purpose-built backup appliance (PBBA). It is designed and engineered for performance, both backup and recovery – and is delivering outstanding recovery results. Based on our internal testing, it restores 4.1TB per hour based on 8 streams at 98% deduplication. Let’s see how that stacks up:

    • Internal testing. In performance test comparison to the NetBackup 5230 appliance, the NetBackup 5330 delivered:
      • Up to 3x faster backup
      • Up to 5.8x faster recovery
      • Up to 4.9x faster replication
    • Customer testing. The NetBackup 5330 has gone through extensive customer beta testing and customer proof-of-concepts (POCs). One customer, an international healthcare information technology company, put the NetBackup 5330 through some significant job count tests and they were pushing up to 600 concurrent backups to see if they could break it. They were able to consistently achieve backups in the 450 concurrent job range – representing more than 10X what they can do today. 
    • Competition. In a comparison to a leading data dedupe storage device, the NetBackup 5330 delivers 55% greater restore performance.  But don’t take my word for it. You can run your own restore number of your current data dedupe solution, or ask the OEM for their published numbers. 

    A Recommendation

    If recovery is a key factor in meeting your data protection needs and service level agreements, I have two recommendations;

    • Do the math. Ask your current vendor for their backup AND recovery performance numbers. You will have to ask for the recovery number as it is not typically published, and then do the math.  Based on the recovery number and your amount of data, is it reasonable that a recovery job would be completed within your service level agreement?
    • Check out the King of Scale. Symantec commissioned an independent third party to do extensive testing of three different backup solutions and the results are eye-opening. Many data protection solutions were good enough when installed, but as the data has grown, organizations have found it does not keep pace and performance begins to lag and then drag. King of Scale Benchmark Report.  

    Summary

    The NetBackup 5330 is engineered for performance, scale, and resiliency. To learn more about the NetBackup 5330 and its capabilities:

    While backup performance often gets top billing, recovery performance is just as critical in order to make B&R the dynamic duo of data protection. 


    0 0
  • 02/19/15--09:12: Women Make Great Engineers
  • Twitter カードのスタイル: 
    summary

    Gender diversity in workforce is much talked about topic these days. So much that in some companies they have very stringent goals and defined hiring process to bring in diversity in the workforce.  So why is having more women in the workforce and especially more women in engineering so imperative? We are possibly looking at 50% of the potential workforce and that cannot be ignored. It is also a well-known fact that companies that have better diversity have better engagement rates and have higher profitability. There are several studies and surveys that prove this point. While I don't want to delve deeper into those points, I want to touch upon factors that keep women from opting for engineering careers and even if they opt why they seem not to be aggressively pursuing their careers.

    There are several social and cultural factors that go into creating the mindsets for women and men, which varies across the globe. However, pretty surprisingly there is a common pattern all over; women are really good at multitasking, and tend to be perfectionistic as well as prioritize family over career. Great qualities indeed and let me tell you, there is no need to change that.  Also, there are phases where women tend to give up their engineering careers midway through, which are essentially life changing, like getting married, bearing kids etc. There is no need to escape these important and wonderful phases of life, it is just a matter of learning to work around them and still have a great engineering career.

    Strive for excellence and not perfection!

    I have seen many women around me, and in my own team, feeling guilty that they could not be a better mother, wife, daughter-in-law etc. Many women at this phase will give up their careers, where the guilt gets the better of them. Where is this feeling of guilt arising, it is predominantly due to the inherent quality for women to seek perfection in everything they do – perfect employee, perfect mother, perfect cook and the list goes on. It is also from the fact that we tend to do everything ourselves. Letting go of things that others can do and concentrating of chores/activities that only I must do, has been a constant lesson for me. But, once l learnt this art, it has been liberating experience. While, I try to be "as good as I can be" mother/engineer, I stopped beating myself up for not being a perfect one! Furthermore, I am able to make more time these days to spend with my kids since I delegated work to others! 

    Please note that I now only seek excellence and not perfection! The reason I tended to do everything myself earlier was because I thought I can do it perfectly and no one else could! I delegate better, have found bandwidth to do more exciting things at work. And behold! It is already bearing dividends! Suddenly my career seems to be blooming while I am able to take care of my family too!

    women_in_engineering_0.jpeg

    Why try to fit in when we can stand out?

    I have constantly thought of fitting in to the system around me both in office and at home. It has taken a lot of mentoring and coaching from my friends, colleagues, family and my managers to unlearn the constant urge to fit in.  I learnt to celebrate the difference in my thought process whether in design discussions, meetings, everywhere! In fact, it took a while for me realize that the difference in my perspective is the real value I bring to table.  Don’t feel isolated for thinking differently, instead that is our unique selling position ladies! 

    Look for role models – there might not many role models for women folk to look up to and get inspired in their immediate organizations. It will help to motivate other women if they have a role model around. In case there are none, look for ones in extended organizations. For example, I had the privilege to interact with our HR Vice President, Amy Cappellanti, and needless to say, that it was highly inspiring. I have heard similar thoughts from my female colleagues in Mountain View, who had the opportunity to interact with Roxane Divol, the Senior Vice President of our Trust Services BU. We must aim to become a role model ourselves. Help our friends to pursue relentlessly towards engineering excellence. 

    Finally, Sky is the limit! What say ladies!!


    0 0

    Last year on Earth Day, Symantec launched the “One Mug, One Planet” campaign to help reduce paper cup usage across our operations by 15 percent and encourage all employees to minimize our impacts both inside and outside the office by making a commitment to use a reusable mug every day.

    In 2014, our goal was to reach 1,000 pledges signed across Symantec and to have 10 percent of employees at sites that have opted in join this campaign.

    With waste management being central to our environmental strategy, Symantec employees took important steps towards achieving our corporate goals.  By December 2014, we had exceeded our initial goal having reached a total of 1313 pledges.

    This means that if all the employees who made the One Mug, One Planet pledge used their reusable mug every day for a year, their individual actions will have saved 114,231 lbs of CO2[1] (#pledges x 87 lbs of CO2) and 30,199 lbs of waste[2] (#pledges x 23lbs) across Symantec operations.

    Of the sites that have opted to join this campaign, we were able to analyze the data of the number of cups used at seven sites[3] over the six month period immediately after the launch of the One Mug, One Planet campaign as compared to a similar time period in 2013[4]. For the six months in 2014 for which data was collected, the seven sites used 314,001 fewer cups than in 2013. This was a 28% savings from the 2013 figures and resulted in $19,627 USD decrease in costs of cups purchased across the seven sites.

    Johanna Laemle, Partner Program Coordinator for the Renewal Partner Success Team and Green Team Lead – Springfield, acknowledges the efforts of employees at the site, “Resource conservation is one of the four key components of Symantec’s environmental strategy and included under that umbrella is waste reduction. We’re excited to say that our involvement at the Springfield, OR campus in the One Mug, One Planet campaign has been a great success in encouraging employees to get personally involved in environmental stewardship! Springfield’s 2014 Earth Day event was a huge success and we signed up over 30 new members that day - which pushed our site’s Green Team to over 300 employees!”

    But, we don’t want to stop there! With three months to go until Earth Day 2015, Symantec is renewing our efforts to demonstrate that “Every Day is Earth Day” through our collective actions.  We have set a goal to reach additional 300 pledges between now and Earth Day.

    Raul Roy_Blanchardstown copy.jpg

    2014 One Mug, One Planet “Mug Shot”: Raul Roy from Symantec’s Dublin, Ireland office with his reusable mug.

    As part of the campaign, employees who have made the pledge are encouraged to take a “Mug Shot” with their reusable mugs. The most creative Mug Shot will win a prize

    Congratulations to our first Mug Shot winner, Raúl Roy, Technical Support Engineer, Enterprise Support Services, EMEA based out of our Dublin office!  Raúl won a 100 EURO Applause Award for his creative “Mug Shot” which was chosen from over 100 submissions.

    Raúl decided to participate in the One Mug, One Planet campaign, “because of the Green [Team] mug :) and to try to reduce waste in the office.” His commitment to minimizing environmental impacts inside and outside of the office also includes encouraging his colleagues to use public transportation or to bicycle to the office. What is Raul’s favorite beverage to enjoy in his mug? “Green tea with some milk.”

    We will announce our next “Mug Shot” winner on Earth Day 2015!

    For more information on Symantec’s Green Teams, please contact Environmental_Responsibility@Symantec.com.​

     
     

    Jaime Barclay is Symantec's Corporate Philanthropy Program Manager and Global Green Team Lead

     

    [1] Based on 2000 study by Starbucks that calculated the average paper-based coffee cup produced 0.24 lb of CO2 – assumes 21,500 Symantec employees, one cup per day, 365 days per year; http://www.ecopedia.com/environment/reusable-coffee-cups-a-simple-step-f...

    [2] Based on 2000 study by Starbucks that calculated one average paper-based cup per day results in 23 lbs of waste by end of the year; http://www.ecopedia.com/environment/reusable-coffee-cups-a-simple-step-f...

    [3]  Sites with available data in 2013 and 2014: Mountain View, CA; Springfield, OR; Dublin, IR; Culver City, CA, Green Park, UK; Heathrow, FL; Roseville, MN

    [4] 6 month usage from July to December, 2013 compared with 6 month usage April to September, 2014


    0 0

    At the excellent 続きを読む


    0 0
  • 02/20/15--07:33: How to Secure Your Webcam
  • Internet is not a safe world and your webcam is vulnerable. It can be remotely activated wihout any notice.

    Also, most hackers take control of your webcam and make videos and take pictures of you without your knowledge.

    The best suggestion is disable the webcam when it is not used.
    The WebCam On-Off tool allow you to easily manage your webcam, in fact in just one click you are able to enabled or disable when you have to use it or not.

    The WebCam On-Off is a free portable program with only few basic functions :

    • Enable the webcam
    • Disable the webcam
    • Capture an image from a webcam

    webcam-OnOff.jpg

    PS: This is the IT way to block your webcam, in any case a basic protection could be also cover with a piece of paper the webcam...

    Supported operating systems: Windows Xp , Vista , Windows 7 , 8 , 8.1 – (x86 & x64)

    License : freeware

    Link : http://www.sordum.org/8585/webcam-on-off-v1-2/


    0 0
  • 02/20/15--15:57: Superfish
  • What you need to know

    A security flaw was discovered in software that was pre-installed on some Lenovo laptops. Lenovo has issued the following Press Release.  The story has been reported on multiple sites (for example, here and here). We applaud Lenovo for quickly publishing details on affected models and instructions for removing the flaw. The problem lies in the software from a company called Superfish that was pre-installed by Lenovo on certain computers. The main function of the software was to intervene when the user performed web searches in IE or Chrome browsers, and insert Superfish’s content into the search result page. Lenovo enabled this software to “help users find and discover products visually”, by incorporating relevant search results not offered by the search engine.

    Interjecting content in web pages is not new (for example, via browser add-ons), but Superfish’s approach was novel, and didn’t use a browser add-on. Instead, the software intercepted all traffic between the browser and the network external to the computer. But since most large search engines (such as, Google, Bing, and Yahoo) now serve all content over https, the Superfish software couldn’t read (and more importantly, modify) any of that encrypted traffic. To get around this, an SSL Man-in-the-Middle (MITM) was set up in the computer itself, creating fake SSL certificates with the domain name of the intended web site. These certificates were signed by or chained up to Superfish’s private root certificate. Ordinarily, browsers would display a prominent warning that such a certificate wasn’t trusted, so that was addressed that by injecting Superfish’s root certificate into the Windows trusted root store during manufacture. To make all this work, of course, the private key corresponding to that root certificate had to be pre-installed on all of these computers. Superfish took steps to encrypt that private key, but the encryption was trivial and quickly broken.

    The result is that attackers now have the private key corresponding to a root certificate that is trusted in these Lenovo computers, and that can be abused in too many ways to describe here.

    In some ways, this is similar to the recent incident with Gogo inflight wifi service. Both make use of an SSL MITM technique to insert themselves into the otherwise secure connection between a browser user and the websites they visit. See our recent blog post to learn how SSL MITM attacks work. In Gogo’s case, the MITM (the actor generating certificates on the fly) was in Gogo’s network; in Superfish’s case, the MITM is in the computer itself.

    As we’ve said before, SSL Man-in-the-Middle solutions can be justified within an enterprise, for example, to monitor employees’ web traffic. But the well-intentioned inclusion of Superfish had unintended consequences far beyond web searching, and created a potential for malicious MITM attacks. Pre-installing any root that does not belong to an audited Certificate Authority and marking it as trusted undermines the trust model created and maintained by platform vendors, browser vendors, and Certificate Authorities. Platform and browser vendors go to great lengths to validate the Certificate Authorities whose roots they include in their trusted root store. Microsoft provided the ability for an enterprise to add additional roots to the Windows trusted root store, and Google Chrome explicitly avoids performing public-key pinning checks for such added roots. As a result, Chrome users receive no warning of the MITM, as they did in the Gogo incident.

    If you think you may have an affected Lenovo computer, visit this web site to check. Uninstalling the Superfish software isn’t enough to remove the vulnerability – you must also remove the Superfish root from the Windows trust store. The instructions provided by Lenovo achieve both objectives.


    0 0

    Symantec is warning that our IPS 20150220.001 definition package was causing Internet Explorer 11 to crash. We have released a fix for this issue through our LiveUpdate servers.
    続きを読む

    0 0

    Launch Your EMEA GRID Campaign Today

    Symantec NetBackup Appliances can help your customers avoid the complexity and hidden costs of Build-Your-Own Media Servers. You now can demonstrate how much they can save with your own NetBackup Appliance Savings Calculator GRID Campaign (preview here)1.

    This is a multi-touch module campaign with mini site, online NetBackup Appliance Savings Calculator tool, solution benefits & validation and email touch plan.

    The tool requires minimum customer input – only 7 data points! It delivers an instant savings result, which your customer can print/ download and offers you a great talking point for the rest of the conversation and follow up meeting.

    The email touch plan (preview email 1, email 2)1 ensures that your customers are targeted strategically and excluded from the plan once they become leads.

    We currently have this GRID campaign live in English and Spanish, but within the next weeks the campaign will be available in more languages (EMEA countries only).

    Launch your NetBackup Appliance Savings Calculator campaign here1,2.

    Important notes:  

    1 registration to Symantec Partner GRID is required.

    2 this campaign is currently only available in the EMEA region.

    Arjan van Proosdij

    @arjanvp


    0 0

    破損した IPS 定義パッケージをインストールした結果、32 ビット版の Internet Explorer で問題が発生することが確認されていますのでご注意ください。シマンテックは、この問題に対応した修正版の定義パッケージを LiveUpdate サーバーを介してリリースいたしました。
    続きを読む

    0 0

    A question which was asked on the Symantec Connect Forums a few weeks ago has come back in to my mind in the last few days. I’ve been working a little bit with a product of QUADROtechs’ called FSA Migrator. I needed to do some deeper work on placeholders.

    The question from the forums is whether there is a way to see the Archive ID and SaveSet ID of an item from the placeholder itself.

    The answer is: Yes.

    If you use FSUTIL you can see that buried in the output, like in the screenshot below:

    2014-07-28_10h06_43_0.png

    I hope that’s helpful to some of you, it helped me a little when figuring things out with FSA Migrator.


    0 0
  • 02/23/15--12:34: Network tool per Windows
  • PingHurry è un programma dedicato alla visualizzazione del comando ping e trace route con visualizzazione in una finestra grafica ( flat o 3D ).

    PingHurry mette a disposizione uno strumento personalizzabile e agile che consente di eseguire dei controlli di connettività di rete con le funzioni di ping/trace/reverse lookup.Un valido programma utilizzabile da Amministratori di rete e power users.

    PingHurry.jpg

    Caratteristiche :

    • Risultato del comando Ping in formato grafico 3D/flat con funzione di zoom
    • Storico di 50 ricerche
    • Esportazione di Grafici e Risultati alla clipboard
    • Esporta i risultati direttamente nel Blocco Note
    • Timeframe e intervallo di ping personalizzabili
    • Applicazione residente in System tray
    • Autostart
    • Scorciatoie da tastiera e Hotkeys personalizzabili
    • Programma gratuito

    Requisiti:  Microsoft .NET Framework 4.0

    OS: Windows 7/8/8.1

    Licenza: Gratuito per uso personale e commerciale

    Link : PingHurry


    0 0

    Symantec’s 2015 State of Privacy report details the findings of research into the general public’s perceptions and attitudes towards protection their information. Surveying 7,000 people across Denmark, France, Germany, Italy, Netherlands, Spain and the UK in December 2014, the report explores consumer behaviour around data protection, and uncovers consumer perception on the value of data.

    Key Findings from Symantec’s State of Privacy Report: UK

    • 59 per cent of consumers want to better protect their personal details but are unsure how to actually go about protecting their personal details
    • 68 per cent of consumers across the EU believe that medical institutions are the most trustworthy with personal data. Technology companies (23 per cent), retailers (21 per cent) and social media companies (12 per cent), are the least trusted.
    • Consumers are divided about who the responsibility lies with to provide adequate data protection. Government (32 per cent), businesses (28 per cent) and consumers (40 per cent) were seen to have equal responsibility on protecting information
    • 75 per cent of people think their data has value and a lot of it, with over 55 per cent believing that their data is worth over €1,000

    The full report is available here and you can read the press release here.


    0 0

    aauw1.png

    It’s no secret that women are underrepresented in science, technology, engineering, and math (STEM) careers. Only 25% of STEM jobs in the United States are held by women. What’s more, the need for cybersecurity professionals is on the rise – data breaches are more common, and more costly, then ever before – yet there were one million unfilled cybersecurity positions worldwide in 2014. This presents a two-pronged issue: a gender gap and a skills gap. One of Symantec’s core philanthropic areas is STEM education, with the cybersecurity issue particularly close to home.

    Symantec’s newest grant partner is the American Association of University Women (AAUW), a nonprofit founded in 1881 that advocates for women’s empowerment through education, research, and policy. Their National Tech Trek Program is a weeklong STEM summer camp that will impact more than 1,600 middle school girls this year. AAUW received a $100,000 grant from Symantec to expand the curriculum to include a core class in cybersecurity. The class will be piloted this year in 3 camp locations:  Bowling Green State University in Ohio, Stanford University, and the University of California, Irvine.

    Read the AAUW’s post on the 3 reasons they want to introduce girls to cybersecurity

    The Tech Trek Program, offered in 21 sites across the United States, uses hands-on strategies to introduce the girls to opportunities in STEM. While spending a week on a college campus, the students get to participate in practical workshops learning everything from building rockets to basic coding. They get to meet female professionals in STEM careers to hear and connect with real life experiences. And now, with Symantec’s donation, they will get to learn about the exciting career opportunities in cybersecurity.

    aauw.png

    “Providing STEM and literacy education to young adults, particularly women and minorities, is a business imperative at Symantec in order to build a diversified and innovative workforce for the future,” said Cecily Joseph, vice president of corporate responsibility at Symantec. “We seek to help bridge the skills gap, looking at how to create a pipeline of STEM-trained and educated future leaders ready to address and help solve problems related to cybersecurity. This grant will help build the pipeline of qualified girls to enter the in-demand field of cybersecurity.”

    Contributing to cybersecurity education for underrepresented groups is not new for Symantec. Last year Symantec launched the Cyber Career Connection (SC3), a unique one-year program that trains and certifies young adults in cybersecurity. The first class of SC3 students has just started their internships this February. You can learn more about SC3 and Symantec’s commitment to Your Information here.  

     

    0 0

    Assisted by Symantec and other industry partners, Europol has seized large amount of gang’s infrastructure.

    続きを読む

    0 0

    ‘Reputation, reputation, reputation! O, I have lost my reputation! I have lost the immortal part of myself, and what remains is bestial.’ So says Shakespeare’s Othello and not many were more jealous or proud of guarding their reputation than the warrior Moor was – or more devastated and damaged by its loss.

    Today, most enterprises are just as precious about their reputations. Lose that through poor practices and unsound judgment, they realise, and they may never win back the trust they have striven for so tirelessly from both their customers and the industry. And when trust is lost, reputation is undone. How badly? According to Edelman’s 2014 Trust Barometer, 53% of people surveyed in the UK refused to buy products from distrusted companies, while 56% of them would criticise the company to a friend, with 30% sharing negative opinions online.

    As cyber-attacks continue to evolve, and data breaches become all too common, the knock-on cost to businesses is growing. Add social media into the mix and a relatively simple mishap can have a far-reaching impact on the reputation of an organisation or brand. All of which should serve as a warning to organisations everywhere that they need to take every possible action to minimise the risks that today’s threat landscape relentlessly presents to corporate reputation.

    So, whether enterprises are rationalising storage or moving to the cloud, identifying and protecting core information (either company IP or customer data), or undertaking compliance projects on stored data, reputational risk must be considered.

    Underlying that risk is a powerful information agenda. People want to feel they have the right visibility and control to protect their company’s key information. We, at Symantec, operate at the heart of that proposition. We are the only people that serve a company from the birth to death of information. We are there at every stage. Moreover, our constant monitoring of the threat landscape means we know where the greatest risk for businesses is concentrated at any time.

    Reducing the level of reputational risk is fundamental to business practice, because information is today’s currency – the lifeblood of an organisation – and, being such a highly valuable commodity, there are ever more incidents targeting that information. Therefore understanding exactly what information an organisation needs to protect has never been more critical.

    While the hyper-connected world brings numerous benefits, it also presents significant business and success risks to an organisation’s reputation. With both external and insider threats increasing, the business and its board need to understand today’s cyber risks, in order to prioritise, manage and balance these. Enterprises must recognise it is not only IT failures, threats to data security and cyber-attacks that must be taken into account, along with their immediate financial impact, but also the longer-term risk to reputation. Most worrying is the apparent lack of awareness of the scale of the damage that can be done by a successful attack.

    It needs to change – and quickly; because, while cyber risk has traditionally been a problem owned by IT experts, that is no longer the case. With far harsher EU-wide regulatory penalties now receiving support from the European Parliament – and the general public much more privacy-aware – companies and the board need to anticipate and prepare for an increasingly tougher environment in the coming years and with this the potential for ever-increasing reputational damage.

    Enterprises need to put the right measures in place to shore up their defences. They need to enable cross-team working to ensure the potential financial reputational impact from cyber risk and IT incidents is delivered to the board in a consistent and transparent manner. Most importantly, risk planning needs to adopt a collaborative approach across teams, so the impact of cyber risk is clearly recognised and understood – not just on the bottom line, but equally on a company’s reputation.


    0 0

    This is a placeholder for the content being presented at the 2015 User Summit in Salt Lake City, March 2-5.

    Slides and videos will be posted here as soon as they are available. Please bookmark this page and make sure to come back and visit.

    In the meantime, check out the great content from the 7.5 User Summit!
     

    March 2015 User Summit: Instructor-led sessions (content coming soon!)

    • User Summit Kickoff and ITMS 7.6 and GSS 3.0 Launch Webcast
    • Leveraging SSL Certificates in the SMP Environment
    • Cloud Enabled Management Design and Implementation
    • Asset Management Suite Technical Overview
    • Symantec Deployment Tools and Use Cases
    • Customization of Deployment Solution Preboot
    • Hardware Independent Imaging (HII)
    • Network Mode Streaming in Client Management Suite
    • Decentralized Administration of Patch Management
    • UI Enhancements in ITMS 7.6

    March 2015 User Summit: Hands-on Labs (content coming soon!)

    • Inventory & Software – Gathering, Detection and Deployment Methods
    • Achieving Software License Compliance with EPM Solutions
    • Managing Servers with Server Management Suite
    • Extending the Reach of IT Analytics

    0 0

    Com a assistência da Symantec e outros parceiros da indústria, a Europol confiscou grande parte da infraestrutura da gangue.

    続きを読む

older | 1 | .... | 138 | 139 | (Page 140) | 141 | 142 | .... | 254 | newer