Comment tourner le BYOD à votre avantage ?
La consumérisation des technologies de l’information oblige les DSI à remettre à plat leurs stratégies de sécurité. Dans le cas d’une PME aux ressources limitées, ce nouvel impératif génère des...
View ArticleVENTAJAS DEL USO DE DISPOSITIVOS PERSONALES EN LA OFICINA
Ante el fenómeno de la «consumización» de las TI, los profesionales informáticos se ven obligados a abordar la seguridad desde una nueva perspectiva. En las pymes, donde los recursos suelen ser más...
View ArticleIst BYOD Fluch oder Segen?
Die Grenze zwischen privater und beruflicher Nutzung von Informationstechnik schwindet und die IT muss ihre Sicherheitsstrategie überdenken, will sie Herr der Lage bleiben. Vor allem mittelständische...
View ArticleBackup: When Having Less Means More
Many small and medium-sized businesses (SMBs) are facing a common growing pain. Lot and lots of data. The amount of data they are storing is increasing enormously, and it’s becoming more and more...
View ArticleThrough a Handset Darkly: Grasping the BYOD Security Paradigm Shift
* This article originally ran on StateScoop on March 19, 2013. "The golden age never was the present age." That's a quote from Benjamin Franklin, who was about as close to a State CIO as you could get...
View Articleフィッシング詐欺師に執拗に狙われるインドの Web サイト
寄稿: Ayub Khanシマンテックは、危殆化したインドの Web サイトにホストされているフィッシングサイトについて継続的に監視を行っています。2011 年には、危殆化したサイトの詳しい調査を実施しましたが、2012 年もフィッシングサイトについて同様の調査を実施しました。2012 年の 8 月から 11 月にかけて、全フィッシングサイトのうち 0.11% が、危殆化したインドの Web...
View ArticleAwareness, Education, and Training
Thanks to regulatory requirements most everyone in the corporate world in the US is required to have official annual information security awareness/education/training. This isn't a bad thing per se,...
View ArticleCyber Readiness Challenge - Paris - Les 5 phases d'une attaque
Les attaques sont de plus en plus nombreuses et ciblées. Pour bien se défendre, il faut d’abord comprendre les techniques utilisées par les attaquants. Les attaquants utilisent bien souvent des...
View ArticleConnect Dev Notes: 22 Mar 2013
User Facing: DesktopAdded more robust image upload tool that allows you to: Upload images to a personal directory on the server.Browse your uploaded images.Resize your uploaded images.Generate...
View ArticleYour chance to be famous
Happy Friday Morning! It's coming up to 9.00 am here in California and so far it's turning out to be a beautiful day. The sky is blue, the sun is out in full force and the landscape around me is simply...
View ArticleHow to Create a Report for the Results of a Filter, in Order to Save as CSV
I was wanting to save the results of a filter to an Excel file today, and I found that the filter did not have a "Save As" button. I found an article here that explained it, but I modified the report...
View ArticleSymantec Endpoint Protection 12.1 “This software requires the Mac OS X BSD...
Here is a work around (below) for this issue. I tried the above method must the Info.plist file want not in the format shown) -1. Log into your Mac as an account with administrator rights2. Open...
View ArticleNew Tidserv Variant Downloads 50 MB Chromium Embedded Framework
Tidserv (a.k.a. TDL) is a complex threat that employs rootkit functionality in an attempt to evade detection. The malware continues to be on the Symantec radar since its discovery back in 2008. The...
View ArticleLearn to "Cut the Clutter" @ Vision 2013 in Las Vegas
It’s no secret that email and file data continue to grow exponentially. At the same time new regulations such as Dodd-Frank and FINRA 10-06 & 11-39 require even more content to be captured and...
View ArticleDifferent Wipers Identified in South Korean Cyber Attack
Our analysis of Trojan.Jokra, the threat which recently caused major outages within the Korean Broadcasting and Banking sectors, has produced another wiper.Security researchers the past few days have...
View ArticleUnable to Archive Public Folder Tree with Enterprise Vault
Some people might say that it's a minor annoyance, but inconsistencies really bug me. What am I talking about? I'm talking about being able to archive a whole folder with the Enterprise Vault...
View ArticleMS12-060 Compliance Result Dropping Abruptly Since the Latest PMImport
I have a customer that is following the compliance status of their computer for MS12-060 in details (as this vulnerability as a high priority in their environment) and yesterday they got back to find...
View ArticleNetBackup Snapshot Client Method
In the Computer and Storage World a snapshot is the state of a system at a particular point in time. More in detail, a snapshot is a point-in-time, read-only, disk-based copy of a client volume (see...
View ArticleWhere to check the EOL or any Release Details for a Symantec Product/Solution
Product or Solution release details includes the following:VersionRelease TypeRelease DateEnd of LifeEnd of Limited SupportLast date for patch releasesEnd of Support LifeLast date to contact supportTo...
View ArticleStorage Optimization - Part IV - Tiering - SmartTier
As in my series of blogs around Storage Optimization there is a commonality about the recognition of the"data explosion" conundrum, and how this is a placing an extra burden on an already stretched IT...
View Article