Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Big Data, Big Responsibility – Symantec CEO Mike Brown Featured Author in...

Ethisphere Magazine’s recent issue – All Eyes on the CEO– features an article by SymantecPresident and CEO, Michael A. Brown. The magazine, published by the Ethisphere Institute, shares insights and...

View Article


Ghost Solution Suite 3

Twitter カードのスタイル:  summary Interested in learning  more about Ghost Solution Suite 3?  Check out this article from Symantec employee Randall Newnham.One of the features of Ghost Solution Suite 3 is...

View Article


Backup Exec 15 Feature Pack 2 includes new Cloud Connector, platform support,...

Backup Exec 15 Feature Pack 2 includes new Cloud Connector, platform support, enhanced user experience and more – Now Available!We are excited to announce the availability of Feature Pack 2 for Backup...

View Article

NCSAM Group Article: Preparing for Future Attacks

Learn how to implement the right cybersecurity strategy 続きを読む

View Article

Image may be NSFW.
Clik here to view.

한국의 시스템을 노리는 듀저(Duuzer) 백도어 트로이 목마

Backdoor.Duuzer가 한국의 기업 및 기관을 표적으로 시스템을 완전히 장악하려 시도하고 있습니다. 이 보안 위협 역시 한국에 유포된 W32.Brambul 및 Backdoor.Joanap과 연관성이 있습니다.続きを読む

View Article


Image may be NSFW.
Clik here to view.

バックドア型のトロイの木馬 Duuzer、韓国のコンピュータを狙って乗っ取り

Backdoor.Duuzer は、コンピュータを完全に制御しようとして韓国の組織を狙っています。以前から韓国を標的にしている W32.Brambul および Backdoor.Joanap との関係も判明しました。続きを読む

View Article

Image may be NSFW.
Clik here to view.

MySQL servers hijacked with malware to perform DDoS attacks

Attackers are compromising MySQL servers with the Chikdos malware to force them to conduct DDoS attacks against other targets.続きを読む

View Article

It's all in the numbers

Sometimes I get a little bit obsessed by version information. Sometimes I get asked what build a particular version of Enterprise Vault is, so then I don't feel quite so obsessed. I used to track some...

View Article


Image may be NSFW.
Clik here to view.

Gone In a Flash

Social media "Badge Bragging" offers cybercriminals a new way to launch attacks Starting a new job is news that many people can’t resist blasting to their friends and colleagues on social media sites....

View Article


Image may be NSFW.
Clik here to view.

My Tech Trek Camp Experience

A Tech Trekker’s Story The American Association of University Women (AAUW) runs hands-on science and math camps each summer called Tech Trek with the goal of encouraging, motivating, and inspiring...

View Article

Grid Component Not Rendering Complete Results of a SQL Integration Component

A customer had written a custom workflow that tracked and managed specific networked assets in their environment.  The specific details of each asset, such as name, location, IP Address, etc, had been...

View Article

Image may be NSFW.
Clik here to view.

MySQL サーバーを乗っ取り、DDoS 攻撃を実行するマルウェア

攻撃者は、Chikdos というマルウェアを MySQL サーバーに侵入させて、他の標的に対する DDoS 攻撃を実行させています。続きを読む

View Article

NCSAM Group article: Creating a Culture of Cybersecurity at Work

Keep your enterprise safe with these helpful resources. 続きを読む

View Article


Deleted Profile Definition Names Cannot be Reused

There are occasions when you need to edit or change or remove a profile definition. In one case, an application property was chosen and the profile definition was edited, adding a new definition value,...

View Article

Image may be NSFW.
Clik here to view.

Tapping Diverse Communities to Address the Cybersecurity Workforce Shortage

SC3 partnered with NPower to train young adults with the skills to successfully pursue careers in cybersecurity. Today, cybersecurity is one of the most important fields in technology, and yet, despite...

View Article


Workflow/ServiceDesk - How To influence HTML elements in a Process View Page

Inject JavaScript into dynamic Process View content Some parts of a Process View Page are rendered without an associated configuration interface. An example of this would be the 'Send Email' Process...

View Article

Internet Explorer Deployment with Task or SWD - Script included

I have recently posted an article which may help out with some deployments since Microsoft support is ending for older browsers.https://www-secure.symantec.com/connect/articles/d...Thanks,Clay

View Article


Introducing New Policy Based Encryption Options for Symantec™ Email...

Today Symantec introduces the new Policy Based Encryption Essentials functionality to the Email Safeguard and Email and Web Safeguard plans of Email Security.cloud.This new functionality will give...

View Article

Absence of additional budgets for a Qurantine Solution? Use postfix in the...

Absence of additional budget for a Qurantine Solution? Use postfix in the interim. Most of the times we come across - leadership teams, auditors, customers, clients and other stakeholder stressing the...

View Article

Image may be NSFW.
Clik here to view.

Questions About Cyber Adversaries? Get Answers With Directed Threat Research...

Symantec DeepSight™ Intelligence launches add-on service for Advanced Enterprise subscribers to provide tailored cyber threat intelligence In today’s evolving cyber threat landscape, security...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>