Are you the publisher? Claim or contact us about this channel

Embed this content in your HTML


Report adult content:

click to rate:

Account: (login)

More Channels


Channel Catalog

older | 1 | .... | 186 | 187 | (Page 188) | 189 | 190 | .... | 254 | newer

    0 0


    Savoy Magazine has recognized Scott Taylor, Symantec’s Executive Vice President, General Counsel and Corporate Secretary, as one of the “Top 100 Most Influential Blacks in Corporate America” for 2016. As a leading African-American lifestyle publication, each year Savoy Magazine publishes a list of Top 100 honorees who have exhibited exemplary professional accomplishments, community achievements and ability to inspire others. This is the second time Taylor has been included in the list among some of the nation’s most accomplished African-American executives, influencers and achievers in corporate America.

    Scott joined Symantec in 2007, became General Counsel in 2008, and now leads a global team of 143 professionals. He oversees the company’s legal work, intellectual property portfolio, government affairs, public policy, corporate responsibility and philanthropic work. He is also a Director on the corporate board of Piper Jaffray, a national advisory board member of the Stanford University Center for Comparative Studies on Race and Ethnicity, and the executive champion and sponsor of SyBER, Symantec’s Black Employee Resource Group. Symantec recently re-launched SyBER, previously Symantec Black Employee Network (SBEN), at a networking mixer hosted at the Symantec Mountain View campus in partnership with HBCU Connect. Employee Resource Groups (ERGs) are more than just a network of passionate employees; they are an invaluable resource for identifying and acting on potential solutions.

    “There is a significant under-representation of black talent at Symantec, and in the tech industry as a whole,” says Scott. “This lack of diversity is a drag on our ability to be innovative and put our best solutions forward. I’m proud that Symantec is finding ways to drive the conversation about diversity, both internally and externally in the broader industry, and I’m excited to lend my voice and efforts to leading change.”

    “Savoy is proud to balance and diversify the mainstream narrative and perspective on professional success in America. From our cover story with Microsoft Chairman John Thompson, to the executives recognized in our 2016 Savoy Top 100, we cover Black leadership, influence and achievement in important ways,” stated L.P. Green, II, Publisher of Savoy Magazine. “We are continually inspired by the success of the executives recognized and we salute the corporations that support and value their diverse contributions.”

    In addition to this honor, Taylor was also profiled in February 2016’s Practical LawThe Journal in their Q&A series that profiles “General Counsel from the World’s Leading Companies.” When asked about the best career advice he had ever received, he stated: “Early in my career, a partner encouraged me to always be mindful of opportunities to learn and seek out new engagements as a means to build my skills and develop the experience needed to be successful in my career. Adhering to this advice has been very beneficial to my development and ability to contribute. This advice has also made the practice of law a truly exciting and fulfilling journey.”

    Congratulations to Scott on being named one of the Savoy Top 100!

    0 0

    SCS Blueprint Survey Available NOW!

    The Symantec Certification Team -- --  has begun the design and development of the Identity and Authentication Services SCS Certification exam.

    The next step in the process is a Web-based survey for the exam that will identify the objectives that will be tested on the exam, and to which extent. You will be asked to rate the exam objectives based on the importance, frequency, and competency required for each objective. Your opinions will be combined with the input from other Symantec IAS product practitioners and used to determine how many questions should be asked on the test for each objective.

    Input from experienced practitioners such as you is vital to validating the usefulness and appropriateness of the exam. We greatly value the input you provide.

    To access the survey:

    Visit: - you will be taken to a Google Forms page hosting our Blueprint Survey.

    When is the survey available and how long will it take to complete?

    The survey is available 24/7 starting today and will be available through Tuesday, March 8th.  Please plan on setting aside approximately 15 to 30 minutes to complete the survey [depending on your expertise]. Your results will only be counted if you complete and submit the entire survey.

    Who should complete this survey?         

    You should complete the survey if you have the relevant technical knowledge and experience with IAS, specifically mPKI, SAM, and VIP products. Ultimately, we seek a minimum of 30 Symantec IAS product practitioners to complete the survey. If you know others in your organization that should participate in this survey, I encourage to you respond to this invitation with their email addresses so that they can also receive a personal invitation to participate.

    0 0

    CEO を詐称して企業を狙う活発なグループが、先日から W2 フォームを利用する手法も使うようになっています。


    0 0

    An Indian restaurant recommendation site contains injected code which redirects users to the Angler EK, which in turn drops TeslaCrypt (Trojan.Cryptolocker.N) on the computer.


    0 0

    Compromised BitTorrent installer used to spread ransomware that encrypts files on Mac OS X computers.


    0 0

    Webinar: (04/26): Dridex: The Financial Threat Clogging Our Mailboxes at 10:00am (PST)

    Webinar (04/26): 

    Dridex is one of the most persistent and prevalent threats facing organizations today.  Configured to collect victim's banking credentials, it is now one of the most active and dangerous pieces of financial malware in circulation.​

    Join this webinar as we discuss:

    • Dridex propagation methods, in particular its massive spam campaigns
    • How Dridex attempts to steal banking information
    • Guidance on how to protect against Dridex infections    

     Register Today

    0 0
    0 0

    The Security Operations Center of 2020
    Twitter カードのスタイル: 

    Michael Brown, President and Chief Executive Officer of Symantec, was on-hand at this year’s RSA conference with a bit of a surprise. His talk, Peek Into the Future: The Security Operations Center of 2020, laid out how today’s threat vectors will evolve, and how IT thinkers will need to extend their plans beyond four walls, addressing the risks across supply chains, eco-systems, and customer touchpoints. But rather than giving a traditional overview, he opted for a different approach in his keynote presentation by inviting Daniel Conroy, CISO at Synchrony Financial, Troels Oerting, CISO at Barclays, and Samir Kapuria, Senior Vice President and GM, Symantec Cyber Security Services,who were sitting in the audience, to help create a broader perspective on the Security Operations Center (SOC) of 2020.

    Brown’s choice for collaborators in the discussion was well-founded. Conroy has been focused on information security for several years, having worked at Citigroup as the global Head of Strategy, Planning and Governance, and the CISO for The Bank of New York Mellon. Oerting’s security expertise includes heading up the European Cybercrime Center, and prior to that, acting as Head of Europol's Counter Terrorism and Financial Intelligence Center. Kapuria is Symantec’s point man on six global Security Operations Centers, as well as Symantec’s Global Intelligence Network—one of the largest cyber intelligence threat networks in the world.


    Brown kicked-off by providing a basic metaphor for one of the major problems impacting the security industry today: fragmentated security solutions. In essence, the security industry has introduced a solution for every part of the IT architecture and for every productivity-enhancing technology, leavingcustomers with a proliferation of products, endpoint, agents, and network boxes—a massive Do-It-Yourself kit. Customers are now spending as much time integrating technology as they are protecting their environment, bringing many to a breaking point and prompting more companies to search for a different approach.

    Brown made a clear case for change when he stated that we are no longer protecting an enterprise contained within four walls, as companies are adapting to new technology trends to improve productivity, like the cloud and increased integration with the supply chain. Moreover, as the traditional perimeter melts away and the attack surface expands, a layered defense at the perimeter becomes less relevant. Meaning? We need a completely new approach to security, with a more holistic view of the ecosystem.

    Which trends are driving change? Brown and his guests addressed the changing attack surface and its impact on the design of future Security Operations Centers. Among their main points, Internet of Things (IoT)as a game-changer brings us to their remote and nefarious control as connectivity surges. "This is a very important and critical area for us to understand, especially in a world of IoT, where we're going to see an explosion from 5 billion connected devices today to 50 billion over the next 5 years," said Brown. "We need to start rethinking security and preparing for that future today." With growing cyber connections to our critical infrastructure—where systems within each sector are automated and interlinked—one catastrophic failure could have the potential to bring down multiple systems.

    When Stuxnet arrived in July 2010, damaging the physical assets of the Iranian nuclear program at Natanz, everyone began to take notice. Closer to home, cell phones, thermostats, and energy meters are starting to create even more interest. "By 2020, we will need visibility across different industries and the power of predictive analytics to protect our connected devices,”said Brown. 

    In addition, the rapid adoption of the cloud and increased integration with the supply chain are introducing new security risks. Companies are losing visibility to information in the cloud—which apps are accessed and what data is downloaded. Likewise, connecting networks to suppliers or customers exposes companies to serious risk. Attackers often prey on the "weakest link" in the supply chain to infiltrate an organization.

    The bad news? What we know is not enough and it will never be. The solution? We need to create a team of SOCs which will allow us to share information freely and in real-time.

    How does this growing space change the way you plan for the SOC of 2020?

    Conclusion: We need to set new standards for information sharing by building a super information highway where instead of hiding, we share information openly. As Brown stated, "There's no doubt that the hyper-connected world of 2020 is going to change the way we work, the way we live, and way we play. And if we create a more secure world at the same time, then that world has the potential to be truly amazing." 

    To learn more about Symantec's telemetry, be sure to check out our Next Generation Threat Protection Solution Brief. To watch a replay of Michael Brown's Keynote speech at RSA 2016, click here.

    0 0

    感染した BitTorrent クライアントソフトウェアのインストーラを利用して Mac OS X コンピュータ上のファイルを暗号化するランサムウェアが拡散しました。


    0 0

    Blog Feature Image: 
    Twitter カードのスタイル: 

    Today, March 8th, marks International Women’s Day – a day observed around the world in celebration of women's economic, political, and social achievements. Back in 2010, March 8th was also chosen by the United Nations as the launch date of the Women’s Empowerment Principles (WEPs), a set of seven guiding principles that, if adopted fully by companies, would lead to gender equality in the workplace. 



    Unfortunately, six years after the launch of the UN’s WEPs, there is much that remains to be done. In fact, if we continue on today’s adoption trajectory, we will not reach gender parity globally until the year 2133!


    Source: EY – Women Fast Forward (

    I want to take the opportunity today to talk about what we, as Symantec employees, can do to move the world towards gender parity. I believe Symantec has the right corporate-level approach to gender equality: we have set a framework by being a founding signatory of WEP, and these principles provide us with a structure to ensure that Symantec remains a place where innovative ideas can flourish, and where both women and men can have productive and satisfying careers. 

    But what can we, as individuals, do to ensure we’re helping the company towards its goals? It starts with being aware, and speaking out when we have the opportunity to do so. I champion gender equality in my interactions with everyone I can at Symantec, from the members of the ELT, to members of my own organization and team. 

    As part of the ELT, I push for us to take action to meet our goal of increasing women in leadership by 5% this year. I keep a pulse on our progress–how many women did we put forth for promotion? How many did we promote? I also think about and call out what comes across as bias in this context. I do the same with my teams–I demand that our slates for hiring include a diverse slate, and I ask “why” if it doesn’t. When looking at our marketing events, I ask to have a gender mix amongst the talent representing us in our campaigns. 

    My own team is very diverse—50% of my direct reports are women—so being “different” is simply not an issue. The challenge on my team is to make sure everyone is comfortable with confrontation and debate. No one on my team, regardless of gender, should be afraid of open dialogue and debate, and we’re fostering an environment that embraces it.  

    It’s in the little decisions we make day-to-day that we start to change culture and move the needle on inclusiveness. I absolutely believe that including the widest array of backgrounds and ideas is the best way to analyze problems, generate ideas, and create new products.

    Today I ask you to join me in pledging for gender parity. You can see what my pledges are, and can also see that I had trouble picking just one. I want to know what will you do to bridge the gender gap at Symantec? Without all of our employees taking action, true gender parity remains a far off goal. I urge you to not let that happen and pledge today to do something about it! Comment below to share your pledges.

    Roxane Divol is Symantec's SVP and GM, Trust Services

    0 0

    This month the vendor is releasing 13 bulletins, five of which are rated Critical.


    0 0

    インドのグルメ情報サイトにコードがインジェクトされ、ユーザーが Angler EK にリダイレクトされており、さらにコンピュータに TeslaCrypt(Trojan.Cryptolocker.N)が投下されています。


    0 0

    真にインテリジェントな脅威防止とは何かを理解し、今日の攻撃者を食い止めるために CISO の全員が知るべきことを考えてみましょう。

    今日の脅威から自社を守ることは、ますます困難になりつつあります。標的型攻撃は、機密データの漏えいや財政的な損失、評判に対するダメージなどをもたらします。一方、高度な攻撃も進化を続け、勢いを増すばかりです。シマンテックの調査によると、2014 年に標的型攻撃の被害を受けた大手企業の割合は、6 社のうち 5 社と、前年に比べて 40% も増加しました。また、推定 100 万のマルウェアが毎日新しく作り出されています。

    今日の攻撃者は、潤沢な資金を持っていたり、国家の支援を受けていたりすることも珍しくありません。高いステルス性と持続性を備えており、自身を隠蔽する新しい手口を見出しては、防御を破って重要なデータを侵害しています。攻撃者の狙いは、クレジットカードや Netflix アカウントを盗み出すといった金銭的な動機に限らなくなってきました。電力グリッドを停止に追い込む、ランサムウェアによって医療システムをネットワークから遮断する、偽装した標的型攻撃によって政治動向への影響力を行使する、金融市場システムを脅かすなど、金融や政治、ハックティビズム、国家が関係する攻撃や防御も想定しなければなりません。

    増え続けるこうした脅威に対抗するためには、1 つか 2 つの機能に対処するだけではなくエンドツーエンドの保護を実現する、次世代のインテリジェントな脅威防止ソリューションが必要です。





    一例として、Symantec Next Generation Threat Protection には次のような機能があります。

    • 多次元のマシンラーニング、高度な悪用の検出、態勢強化によって、高度な脅威やゼロデイ攻撃を遮断
    • シマンテックのグローバルな脅威分析機能と、脅威の専門研究者から届くリアルタイム情報によって、プロアクティブに攻撃を予防
    • 高度な攻撃に対するディープフォレンジックと高速な修復を、単一のエージェントを用いる最新 EDR テクノロジによって実現
    • 高いパフォーマンスと低い誤認率

    この 4 つの機能こそ、次世代の脅威防止が真に成立する基本的な要素です。この 4 つを定義する必要があります。



    マシンラーニング(ML)とは、大量データの自動解析を通じて概念を学習できる、アルゴリズムの一種です。セキュリティ企業の多くは、悪質なファイルや URL のような新しい攻撃の痕跡を検出するために、ML という、いわば「選別器」を利用しています。たとえば、悪質なファイルの選別器を作る場合、正規のソフトウェアファイルと悪質なソフトウェアファイルを大量に収集し、解析してその挙動(このプログラムはシステムディレクトリのファイルを削除しようとしたとか、このファイルはセキュリティ設定を変えようとしたなど)を抽出します。次に、これをトレーニングデータとして ML システムに読み込ませると、ML システムは各カテゴリのソフトウェアに対応する挙動の特性を学習することによって、正しいファイルと不正なファイルとを弁別できるようになります。

    このシステムで問題なのは、判定の基準になる挙動が完全に攻撃者の管理下にあるということです。たとえば、攻撃者がマルウェアの一連の挙動を変更しただけで、既存の ML 選別器はたちまちそれを検出できなくなってしまいます。あるいは、攻撃者がマルウェアのバイナリファイルのサイズを変えたり、命令の順序をいくつか変更したりすれば、その後のマルウェアはもう選別器に引っかからなくなります。最終的に、攻撃者の側で制御可能な機能(挙動やソフトウェアの命令)だけに頼っていたのでは、ML システムは攻撃に対してまったく無力ということです。


    シマンテックが開発したのは、セキュリティに対するまったく新しいアプローチで、従来型の機能(上述)と、「集合知」と呼ばれるクラウド機能とを組み合わせた多次元のマシンラーニングを利用するものです。クラウド機能では、シマンテックの億単位に達するアクティブユーザーにおける採用パターンを解析し、任意の 1 つのソフトウェアファイルや、インターネット上の URL の安全性を計算しています。

    シマンテックの ML システムは、シマンテックのお客様がソフトウェアファイルやインターネット上の Web サイトを利用する日々の操作を、リアルタイムで何十億件も解析します。それに基づいて、どのソフトウェア、どの Web サイトを採用しているか、あるいは回避しているかということを、人口統計別(パワーユーザー、初心者、企業、頻繁に攻撃を受けるユーザー、ユーザーの居住地域など)に学習します。このように、ソフトウェアや Web サイト自体の状態やその挙動ではなく、誰がソフトウェアや Web サイトを採用または回避しているかというコンテキストを調べるアプローチなので、攻撃者からはコントロールがほぼ不可能なアーチファクトの安全性を、まったく独立して評価できるわけです。採用ベースのシマンテック ML システムは、あるファイルが多数のユーザーに採用されたか、それともまったく採用されなかったかを識別します。あるいは、パワーユーザーによって回避されたとか、頻繁に感染するユーザーによる採用率が高かったということも判定されます。こうした情報に基づいて、新しいファイルまたは URL の安全性に関する膨大なコンテキストが蓄積されていきます。

    シマンテックは、この人口統計別採用ベースの ML アプローチを単独でも使っているほか、ソフトウェアファイル(や URL)の挙動と構造を判定する従来型の ML アプローチと組み合わせても利用しています。その結果として生まれたのが、ソフトウェアファイル(や URL)の挙動と、シマンテックユーザーによるリアルタイムの利用状況との両方を判定する ML システムです。攻撃に対する耐性がはるかに強く、かつ高い感度を備えた(誤認率も低い)システムになっています。

    エンドポイントベースの ML だけに依存し、クラウド機能を利用しない企業にはもうひとつ問題があります。エンドポイントの側が、ソフトウェアスタック全体が攻撃を受けやすい状態になり、悪用を許しかねないということです。シマンテックは、そうした必要があるエンドポイント側でも、また攻撃者の手が届かないクラウドでも ML を利用しているうえ、スケールとスピードに応じて最適化しているので、企業のどんな状況でも広く効果が発揮されます。

    また、シマンテックは世界最大のセンサーネットワークを備えているため、このような革新的な ML のアプローチを広く拡散できるという特異な立場にあります。こうしたコンテキストベースの評価に求められるグローバルな可視性を、このレベルで実現できるベンダーはほかにありません。




    クラウドインテリジェンスのようなプロアクティブなマシンラーニング技術が進歩したため、シグネチャ定義の大きさは大幅に縮小しています。わかりやすくたとえるなら、Web ブラウズ中に画像数枚をダウンロードするくらいのサイズです。




    シマンテックには、Center for Advanced Machine Learning(CAML)というチームがあります。セキュリティをめぐるマシンラーニングの専門家チームとして、ディープラーニングを含む高度な ML 技術の研究開発に携わっています。

    Symantec Cynic ― クラウドベースのサンドボックス処理にマシンラーニングを応用している事例

    Symantec Cynic は、Symantec Advanced Threat Protection の一部であり、高度な脅威を検出できるクラウドベースの動的なマルウェア解析サービスです。一般的なサンドボックス解析製品は、各種の仮想マシンや顧客固有のイメージを用意し、そこでマルウェアを発動させて検出することに主眼を置いています。一方、Symantec Cynic はマシンラーニングベースの高度な解析を、シマンテックのグローバルインテリジェンスと組み合わせているため、特にステルス性と持続性の高い脅威も検出します。

    今日、高度な攻撃のうち 28% は「仮想マシン対応」しています。つまり、一般的なサンドボックス処理システムで実行されている場合、疑わしい挙動を見せないということです。これに対処するために、Symantec Cynic は疑わしいファイルを物理ハードウェア上で実行し、従来型のサンドボックス処理技術では検出をすり抜けてしまう攻撃も発見します。

    Cynic は、こうした技術をすべて駆使して結果を取り出し、その判定と解析結果、詳しい脅威情報をユーザーに伝えます。


    シマンテックは継続的にイノベーションに取り組んでいますが、そのビジョンは脅威の検出、情報の保護、サイバーセキュリティサービス、総合的なセキュリティ解析という 4 本の柱を基礎にしています。シマンテックが包括的なビッグデータ分析プラットフォームを開発しているのも、膨大なセキュリティ遠隔測定データを収集し、その解析からローカルとグローバルの脅威を見出したうえで、そこから得られる知見から安全な回答を導き出すためです。そして、そのビジョンには、高度なマシンラーニングとディープラーニング技術というイノベーションが不可欠な要素です。

    最近 は、企業エンドポイントセキュリティの部門で Symantec Endpoint Protection が「Best Protection 2015」賞を獲得したと発表しました。また、シマンテックは 2016 年の Gartner Magic Quadrant レポート「Data Loss Prevention, Managed Security Service Providers, and Endpoint Protection Platforms(データ漏えい防止、マネージドセキュリティサービスプロバイダー、およびエンドポイント保護プラットフォーム)」でも、主要 3 部門でリーダーに選出されています。



    0 0

    Phishing attacks have linked back to YouTube channels where phishers explain their attacks and promote their tools while looking for buyers.


    0 0

    Blog Feature Image: 
    Twitter カードのスタイル: 

    With the Veritas separation behind us, Symantec is now focused solely on security. While we always appreciate when one of our customers is willing to publicly go on record about the benefits they derive from our solutions, we understand why this rarely happens. In fact, we are reluctant to ask because we know that talking publicly about one’s cyber security implementation will often put a target for bad actors on those doing the talking.

    Enter CustomerONE. Our mission is three-fold.

    1. Our first job is to ensure that Symantec is securing our own enterprise using our own solutions.
    2. Our second job is to make sure that our product teams and our expert security practitioners work closely together to develop real world solutions that deliver value to our enterprise and our customers.
    3. Finally we serve as a bridge to Symantec's customers. We do this to make sure that if anyone has a target on their back it is us not you, and we want you to benefit from our knowledge and experience. 

    CustomerONE has writers who document and tell the stories of Symantec's own experiences using and deploying our solutions. We also ensure that when customers have questions we help them get access to the best minds in the business. Our work drives better solutions and better outcomes for our customers and Symantec. 

    We're pleased to announce that we're now launching our public site. Here you can register to have access to our complete vault of content and be notified when new content becomes available. You'll hear the reality of what it's like to deploy our solution into the enterprise and you'll be able to better understand issues that we have faced that you too might face in your environment.

    We hope you benefit from our work as much as we enjoy creating it for you.

    0 0

    Ever-expanding issues permeate SaaS, IaaS and Sec-aaS while increasing threats loom
    Twitter カードのスタイル: 

    The RSA conference for 2016 offered plenty of insights from all sides of the security debate. Including what some have remarked as the most thorough and in-depth conversation concerning the future of cloud security by Symantec Senior Vice President, Information Protection, Nicolas Popp.

    Without much delay, Popp launched into a fun, informative discussion for a standing-room-only crowd in his session, Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security, dealing with the ever-expanding issues surrounding the transformation of SaaS, IaaS and Sec-aaS against a backdrop of increased threats.

    Popp is no stranger to cloud-based issues as Senior Vice President, Information Protection at Symantec, and prior to that, as CTO of VeriSign Security Services, so his talk was indeed informative as many commented afterward. His primary focus dealt with 3 main areas: SaaS security, IaaS security, and Security as a Service.

    The short version?

    SaaS Security is about the data, not the network. Popp suggested that SaaS security use cases are identity and data centric, signaling a shift from traditional security. Cloud application security will be best served by a single security control point, called the Cloud Access Security Broker (CASB). CASBs will be responsible to provide access control, data protection, and threat protection across all Enterprise SaaS applications. And when you think about it, it makes sense. Organizations need to know where their data sits, who has access, and where it’s going. To do that, having the right viewpoint to help simplify the analysis should be a top priority. The impact to both the customer and the industry? Reframing the conversation to a more awareness-focused strategy is going to save organizations millions of dollars in preventing lost or compromised data. Companies looking for security for their cloud apps will be interested in getting further perspective.


    Popp then shifted the discussion to IaaS Security (micro-perimeter security), showing how protecting workloads across clouds, primarily public clouds like Amazon AWS, Microsoft Azure, private and hybrid clouds offers significant challenges. He emphasized the need for a workload-centric security agent. These agents are added to the image in order to harden the operating system, white list processes, provide app-level controls, automate the management of vulnerabilities, and manage East-West traffic across workloads.

    With Amazon AWS certain to be a continued area of interest, organizations will undoubtedly be looking toward solutions that encompass workload and virtual network security agents to beef-up their ability to protect their fast growing cloud workloads in 2016. The new perimeters? Popp noted that the perimeter is far from dead. Instead, the perimeter is transforming. He suggests that because an enterprise no longer controls the physical network, security will shift to a world of many perimeters: workload, process, micro-segment, data, perimeters everywhere!

    The Cloud Security Operations Center

    Popp suggested that the management of security is also shifting to the cloud. He noted that traditional SIEM are not scaling to the cloud. Instead, the SOC architecture needs to evolve towards big data security analytics. In that new architecture, identity and data become the new threat planes. Analysts must now chase bad IDs in addition to bad IPs. Indeed even the SIEM is moving to the cloud.

    Where does this all lead us? Popp indicated that cloud security is an evolution, and that organizations would do well to develop a holistic cloud security strategy that includes the protection of corporate SaaS applications, corporate workloads and systems running in public or private IaaS, new security management and monitoring services in the cloud, and to formulate a plan for a new Cloud Access Security Broker.

    The key is understanding IaaS workloads security, including the workload and SDN-centric security controls that compliance and security will require, should be a part of the mix, and to consider big data security analytics, with integration of big data architectures and machine learning, as part of any SIEM/SOC strategy.

    For more information, see Popp's presentation: Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security. For additional Information Protection resources, please visit:

    0 0

    今月は、13 個のセキュリティ情報がリリースされており、そのうち 5 件が「緊急」レベルです。


    0 0

    フィッシング攻撃から YouTube チャネルにリンクし、攻撃についての解説やツールの宣伝で買い手を探す詐欺師が登場しました。


    0 0

    The Latest Intelligence for February 2016 reveals that one in every 125 emails sent last month contained malware.


    0 0

    2016 年 2 月の「Latest Intelligence(最新インテリジェンス)」が公開され、同月に発信されたメール 125 通のうち 1 通にマルウェアが含まれていることが明らかになりました。


older | 1 | .... | 186 | 187 | (Page 188) | 189 | 190 | .... | 254 | newer