Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Are Risk Matrixes misleading & dysfunctional to Decision Making?

Theoretically, a risk matrix would seem to be a reasonable way of prioritizing risk management actions. Unfortunately, there are three major problems with the matrices as they are currently being...

View Article


A Structured Resiliency Workshop Format

Deciding what to do and where to invest to achieve higher levels of availability and more resilient recovery is a lot harder than it might first appear.  When it comes to resiliency there is not a...

View Article


Image may be NSFW.
Clik here to view.

Our commitment to a great Vision experience

Twitter カードのスタイル:  summary In October, Symantec unveiled a new strategy that would allow us to deliver better value to our customers and partners. This strategy will see Symantec separate into two...

View Article

Data Center Consolidation A Foundation to Cloud Computing

IT organizations have undergone rapid, organic growth and organizations continually scramble to meet the ever-increasing demands of the business. New applications, emerging technologies and alternative...

View Article

Image may be NSFW.
Clik here to view.

Destover: Destructive malware has links to attacks on South Korea

Some samples of Destover share a C&C server with Volgmer and also share similarities with Jokra and Shamoon. Twitter カードのスタイル:  summary Backdoor.Destover, the destructive malware that was the...

View Article


Image may be NSFW.
Clik here to view.

Five Service Classes to Establish an IT Service Catalog

An IT Service Strategy is based on a service provision model, or Service Classes supports an organization’s transformation to cloud computing.Read More

View Article

Image may be NSFW.
Clik here to view.

Ransomware Do's and Dont's: Protecting Critical Data

Ransomware threats such as CryptoLocker or CryptoWall are becoming more prevalent in enterprises. The purpose of these threats is quite simple; they are attempting to extort money from their victims...

View Article

Image may be NSFW.
Clik here to view.

DS 7.5 SP1 PECTAgent.exe crashing after upgrade (SP1 HF3 - SP1 HF4)

corrupted .dll files In some case, after upgrading DS, the PECTAgent.exe is crashing in automation without any error message.From the PECTAgent. logs we see as final...

View Article


Image may be NSFW.
Clik here to view.

Mind the gap: Are air-gapped systems safe from breaches?

Recent research has suggested several ways air-gapped networks could be compromised, but how realistic are these attack scenarios? Twitter カードのスタイル:  summary Contributor:Candid WueestIndustries that...

View Article


Image may be NSFW.
Clik here to view.

Cyber Intelligence In An Online World

Turning data into intelligence is a prerequisite in these highly uncertain times, because not only does that empower organisations of all shapes and sizes to address today's cyber security challenges,...

View Article

Image may be NSFW.
Clik here to view.

Destover: 破壊的なマルウェアと韓国に対する過去の攻撃とのつながり

Destover のいくつかのサンプルは Volgmer と C&C サーバーを共用しており、Jokra や Shamoon との類似点も見られます。 Twitter カードのスタイル:  summary FBI は先週、Backdoor.Destoverという破壊的なマルウェアに対する緊急警告を発表しました。Destover...

View Article

Image may be NSFW.
Clik here to view.

DS 7.5 Ghost error when capturing image"Message description : The request...

Error 183 on the console links to GHOSTERR: The request could not be performed because of an I/O device error The Create Image Task fails with generic error:"ErrorMessage: The Exception have occured...

View Article

SmartAssist: Workload analysis tool

  SmartAssist: Workload analysis tool Read More

View Article


Test1

Allow Please ignoreLarge HR File (DLP Validation).docx

View Article

Image may be NSFW.
Clik here to view.

DS 7.5 "Prepare for image capture" task running indefinitely with "waiting...

Sysprep fails with "a fatal error occurred while trying to sysprep the machine" The "Prepare for image capture" stays on "waiting for agent to get the task"indefinitely or until it times-outThe SMA on...

View Article


Image may be NSFW.
Clik here to view.

How to Include File Path in Heka Logstreamer

I am trying Heka for my current project. I need to include the source file path in the output message. I thought I would need to modify the plugin but there's actually an option called differentiator...

View Article

Image may be NSFW.
Clik here to view.

Symantec Named No. 3 Most Community-Minded Tech Company in America by The...

Yesterday, Symantec was named to The Civic 50 list of the most community-minded companies in America. In the technology sector, we were ranked number three.The Civic 50 – featured in this week’s...

View Article


Image may be NSFW.
Clik here to view.

5 ways to protect your business against SQL injection

Twitter カードのスタイル:  summary Your database has been breached, malware has infected your systems and sensitive records are available for anyone to download on the internet. Your first action is to launch...

View Article

O Cenário de Ameaças em 2014 e o Futuro: Previsões da Symantec e Norton na...

Twitter カードのスタイル:  summary Os analistas de segurança chamaram 2013 de “O ano das mega violações”, e as vulnerabilidades graves descobertas em 2014, como o Heartbleed e Shellshock, mostraram que a...

View Article

Ciberseguridad: ¿Qué pasó en 2014 y qué esperar para 2015?

Twitter カードのスタイル:  summary El año 2014 está por terminar y es importante revisar qué ha pasado en los últimos meses en materia de ciberseguridad para entender lo que podemos esperar para el próximo...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>