article thumbnail

Symantec Finally Agrees With Everyone Else In The Security Community: Says Antivirus Software Is Dead

CTOvision

But the hottest firms in cyber security, those growing because they make real, measurable, virtuous differences in enterprise security, are growing because they realized that Symantec''s core antivirus features just are not sufficient. The reality is that antivirus software that uses old fashioned methods of signature analysi.

Symantec 382
article thumbnail

Tech Companies Will Alert Users of Data Demands

CTOvision

With the current public attention on information security and privacy, major tech companies’ increasing reluctance to cooperate with law enforcement officers – in this case, by no longer handing over American data without their notification – is an important trend. By ShannonPerry.

Company 264
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The CISO Technology Report: Twice A Week Review For Enterprise Security Professionals

CTOvision

This has become one of our most popular lists, with over 2,000 security professionals subscribing to the report. Analysis Big Data CTO Cyber Security DoD and IC Mobile Startup News Business Chief information security officer Chief technology officer CISO CISOtech.com Computer security Consultants Security'

article thumbnail

Public Cloud IaaS : A Price/Performance vs. Security Analysis

Cloud Musings

What seems surprising, however, is that this shift is happening even in the face of repeated cautions and warnings about the security of public clouds. Since CSC was not included in Cloud Spectator''s performance analysis they are also not included in the chart provided above.). Jackson 2012 ).

Analysis 131
article thumbnail

New Video: Automating Your Cyber Defenses Including Malware Removal

CTOvision

Analysis Big Data Cloud Computing CTO Cyber Security DoD and IC Strategy The Future Trends Video Automation Chief information security officer CISO Computer security Malware'

Malware 276
article thumbnail

Our Views On Automating Cyber Defense Including Malware Removal and Return to a Known Good State

CTOvision

Analysis Big Data CTO Cyber Security Cyber Threats DoD and IC Automation Chief information security officer CISO Computer security cyber security' Download “Automating Removal Of Advanced Threats” Automating-Removal-of-Malware.pdf – Downloaded 468 times – 918 kB.

Malware 253
article thumbnail

Video Shows What To Do When Your Cyber Adversaries Are Automating

CTOvision

Analysis CTO Cyber Security DoD and IC Automation Chief information security officer CISO Computer security ctovision Malware'

Video 258