Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Microsoft Patch Tuesday – December 2014

This month the vendor is releasing seven bulletins covering a total of 24 vulnerabilities. Thirteen of this month's issues are rated 'Critical'. Twitter カードのスタイル:  summary Hello, welcome to this...

View Article


Image may be NSFW.
Clik here to view.

Underground black market: Thriving trade in stolen data, malware, and attack...

The underground market is still booming after recent major data breaches. The price of stolen email accounts has dropped substantially, but the value of other illegal goods and services has remained...

View Article


Image may be NSFW.
Clik here to view.

It’s "Tool Time"– Windows Error Reporting (WER)

Memory dumps without even asking Steve’s previous It’s Tool Time blog about using DebugDiag gives some great advice on how to reactively gather dump files for analysis of issues that have been noticed...

View Article

Backup Set retention and expiry Handling on Removable (RDX etc) media

DLM against Removable Media Backup Exec 2014 handles removable media in a completely different way from the initial release of Backup Exec 2012 and BE 2010 R3 or earlier versions. This blog is an...

View Article

Image may be NSFW.
Clik here to view.

The Hour of Code: Engaging Millions of Students in Computer Science

In celebration of Computer Science Education Week, Code.org has organized its second annual Hour of Code. This global initiative challenges millions of students to try one hour of coding. The...

View Article


Image may be NSFW.
Clik here to view.

A look at 2015

Long live the list! As we reach the end of the year, one of my favorite things to do is look through a never-ending supply of lists:  Christmas lists from my kids and family; “Best of …” lists for...

View Article

symantec DLP

DLP HiDoes Endpoint Protect Prevent works even when the Client machine has booted in safe mode.Requesting your replies on this.

View Article

SEP 12 RU5 issue with Computer logs

SEP 12 RU5 Computer logs Hi All,After upgrading SEP 12 RU4 to RU5 it was observed the logs for Computer status does not have Virus Defs column. Have some one observed it.

View Article


Image may be NSFW.
Clik here to view.

¿Cuál es la manera más segura de pagar en estas fiestas?

Analizamos todos los medios de pago, online y offline, y los cuidados que debe tener en cuenta a la hora de hacer sus compras. Las fiestas ya vienen acompañadas de suficiente estrés: encontrar el...

View Article


Image may be NSFW.
Clik here to view.

Las 12 estafas de la Navidad pasada

Los cibercriminales suelen usar los mismos trucos todos los años, así que hemos resumido las 12 estafas de la Navidad pasada para que esté atento. Es el momento de realizar las compras de fin de año:...

View Article

Image may be NSFW.
Clik here to view.

Symantec to Pre-Verify Applicants on .bank and .insurance gTLDs

a fundamental shift in the Internet landscape Twitter カードのスタイル:  summary As recently announced, fTLD Registry Services has partnered with Symantec to verify applicants before domain names are approved...

View Article

Image may be NSFW.
Clik here to view.

Unified Identity by Symantec

The ultimate security boundary Unified Identity by SymantecAt Symantec we thrive protecting people's and organization's life.  Symantec’s Job is “easy”:“prevent bad guys to get in, and prevent good...

View Article

Cinco maneiras de reforçar o programa de segurança cibernética da empresa

Abaixo estão cinco elementos essenciais que todas as empresas devem considerar conforme avaliam continuamente sua programação de segurança. Twitter カードのスタイル:  summary Autor: Tarun Sondhi, estrategista...

View Article


Cinco maneras de reforzar el programa de ciberseguridad de su empresa hoy mismo

A continuación, se incluyen cinco elementos esenciales que todas las empresas deben considerar a medida que evalúan continuamente sus programas de seguridad. Twitter カードのスタイル:  summary Por Tarun...

View Article

7 maneiras de proteger sistemas virtuais de um ataque digital

Quando o assunto é sistemas virtuais, a realidade nos mostra que as ameaças estão constantemente em evolução. Twitter カードのスタイル:  summary Autor: Danie D. TaylorQuando o assunto é sistemas virtuais, a...

View Article


Siete maneras de proteger sus sistemas virtuales contra un ataque digital

En lo que se refiere a los sistemas virtuales, la realidad nos muestra que las amenazas están en constante evolución. Twitter カードのスタイル:  summary Por Danie D. TaylorEn lo que se refiere a los sistemas...

View Article

Mantendo os clientes e recuperando a reputação após uma violação de dados

Três grandes fatores são essenciais para ajudar na recuperação rápida de uma empresa: restauração da marca, gerenciamento construtivo de responsabilidades e prevenção da migração de clientes. Twitter...

View Article


Cómo conservar a sus clientes y recuperar su reputación después de una fuga...

Tres factores importantes son esenciales para ayudar a las empresas a recuperarse rápidamente: restaurar la marca, administrar constructivamente las responsabilidades y evitar la migración de los...

View Article

Image may be NSFW.
Clik here to view.

Qual é a forma mais segura de fazer pagamentos durante as festas de Natal?

Neste Natal, estamos examinando todas as formas de pagamento, online e offline, e as maneiras mais seguras de cuidar de todas as compras durante o período de festas. As festas de Natal sempre causam...

View Article

Image may be NSFW.
Clik here to view.

Os 12 golpes de Natal passados

Selecionamos os principais golpes de Natais passados para que você fique atento. Noite feliz para as compras: de acordo com uma pesquisa realizada pela National Retail Federation, 56% dos consumidores...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>