Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Disarm Advanced Persistent Threats with Symantec Messaging Gateway

Most people today rely on email as their method for business communication – sending and receiving hundreds of emails every day. This dependence on email can create a weak link in securing corporate...

View Article


Image may be NSFW.
Clik here to view.

2014 Predictions from Symantec

Whispers.The secret to predicting the future is to listen for the whisper.By the time you’ve heard things in a loud, clear voice they have already come true. I’ve been listening to the whispers in 2013...

View Article


Backup Exec 2012 adds support for VMware vSphere 5.5

The Backup Exec 2012 Service Pack 3 (SP3) is now available for download and adds support for vSphere 5.5.How to download the service packIf you are an existing customer and would like to download the...

View Article

Disarm Advanced Persistent Threats with Symantec Messaging Gateway

Most people today rely on email as their method for business communication – sending and receiving hundreds of emails every day. This dependence on email can create a weak link in securing corporate...

View Article

The Halo Effect & What Businesses Need to Know about Macs, Malware & Security...

It’s called the Halo Effect. iPods and iPhones created a “halo” that drove sales of Macs to business users. I noticed it a couple years ago, as I watched the number of Macs sitting around the...

View Article


Image may be NSFW.
Clik here to view.

Typhoon Haiyan: Spammers Strike with DHA Attack

Tacloban, the new ground zero created by Haiyan, is the raison d'être for a large directory harvest attack (DHA) launched by spammers today.A DHA attack is launched to check the validity of an email...

View Article

Image may be NSFW.
Clik here to view.

スマートフォンユーザーを狙うフィッシングとマルウェアの複合型攻撃

寄稿: Avdhoot...

View Article

How to see the retention category of archived items in Enterprise Vault

Which retention category an email has been stored under is not something that users usually concern themselves with. For the most part, once it's archived it's archived, and they're done with it. From...

View Article


Taking Green Building to the Next Level - Customizing LEED

For the past week, the United Nations Climate Change Conference has convened in Warsaw, bringing together delegates from over 190 countries hoping to move closer to a global agreement on GHG emissions...

View Article


Image may be NSFW.
Clik here to view.

Knowledge is Power - Website Vulnerabilities

This blog post is based on the ‘Knowledge is Power: Symantec Guide to Protecting your Website’ whitepaper which is free to download now.In 2012 Symantec performed more than 1,400 website vulnerability...

View Article

Image may be NSFW.
Clik here to view.

All Your Tomcat Are Belong to Bad Guys?

Symantec has discovered a new back door worm-type threat which targets servers running Apache Tomcat. This threat is a little different from the ones we usually encounter every day.Back door type...

View Article

Part 3: The Future State of Cyber-security

This blog will discuss a vision for ‘to-be state’ of enterprise security and targeted attack protection, and is the last part of this blog series.Part 1: The Future State of Cyber-securityPart 2: The...

View Article

Pushing for Continuous Improvement - A Special Announcement on Corporate...

I took on the exciting challenge of leading Symantec’s global corporate responsibility (CR) and sustainability department eight years ago. Overseeing the CR efforts for a global company such as...

View Article


Symantec Receives Key Government Certifications for Shared Service Provider...

As high-profile information leaks and cybercrimes proliferate, government agencies face the tall responsibility of protecting increasing amounts of data from progressively complex threats. One...

View Article

30 minute Director of IT Level Interview's Needed

I'm looking to do a 30 minute interview with an IT "Business Owner" role to help shape the business value requirements of a new concept we're researching and I need your help doing so.  Can you please...

View Article


Image may be NSFW.
Clik here to view.

Fake AV Software Updates Are Distributing Malware

Contributor: Joseph GrazianoA new clever way of social engineering spam is going around today that is attempts to trick users into running malware on their computers. The methods malware authors are...

View Article

Image may be NSFW.
Clik here to view.

台風 30 号(ハイエン)に付け込んで DHA 攻撃を仕掛けるスパマー

台風 30 号(ハイエン)による最大の被災地となっているタクロバンが現在、スパマーによる大規模なディレクトリハーベスト攻撃(DHA)の標的となっています。DHA...

View Article


Image may be NSFW.
Clik here to view.

Tomcat サーバーを狙う攻撃者

シマンテックは、Apache Tomcat...

View Article

Image may be NSFW.
Clik here to view.

Spammers Aim to Ruin Holiday Fete

Contributor: Vivek KrishnamurthiThe holiday season starts in the United States on Thanksgiving on November 28 preceding Black Friday, which occurs on November 29. This also marks the beginning of the...

View Article

Symantec’s New Channel Strategy Charts Course for Successful Partner &...

Last week at our annual North America Partner Engage event, we pulled back the curtain on Symantec’s new Global Channel Strategy and shared how we are changing the way we go to market. We have...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>