Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to. The Symantec Government Symposium features 10 sessions where attendees will: Explore how agencies can develop a process for incident response prioritization and use actionable intelligence throughout the entire threat lifecycle. I also really look forward to learning everything I can about Symantec’s views and their technology roadmap.

We Are Living In The Age of the Mega-Breach

CTOvision

Every year for 19 Years Symantec has produced an Internet Security Threat Report, capturing insights which can inform defenses. Symantec is known for their Global Intelligence Network , a monitoring capability made up of more than 41 million attack sensors. Here is how they describe this network: Symantec’s Global Intelligence Network is made up of more than 41.5 Symantec also found that the length of these campaigns was three times longer than campaigns in 2012.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

White House Tightens Security for Web Access

CTOvision

As the birthplace of the Internet, the U.S. government has a special responsibility to support the Internet's long-term health and vitality. meet those responsibilities and help the Internet remain a safe place for its users around the world. Because HTTPS requires the purchase of an SSL certificate from a signing authority, such as GlobalSign , Symantec , or Comodo , and because some program changes are needed, budget has to be found to cover the additional cost.

Fed Tech Roundup August 27

CTOvision

Symantec takes on the Internet of unsecured things - GCN.com. USPS Official: First Priority with Internet of Things is Cost Cutting - Nextgov. News Aircraft FAA Navy Symantec Unmanned aerial vehicleThe following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. Army tries to speed cyber acquisition process - FCW.com. State Dept. IG chides diplomats for using private email.

Barracuda, ReversingLabs, Telefonica and Zscaler Join Cyber Threat Alliance

CTOvision

February 13, 2015 – Fortinet (NASDAQ: FTNT), McAfee Labs, Palo Alto Networks® (NYSE: PANW) and Symantec (NASDAQ: SYMC), co-founders of the industry’s first cyber threat alliance, today announced that Barracuda Networks, Inc. ABOUT SYMANTEC. Symantec Corporation is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings -- anytime, anywhere. CTO Paloalto Symantec By Bob Gourley.

Tech News Roundup April 13

CTOvision

Jeff Bezos: What the commercial space industry can learn from the Internet revolution. Symantec: A Zero-Day discovered every week last year - FedScoop. News Facebook Jeff Bezos NASA STEM SymantecKatie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. Noblis Among 2016 SECAF Small Business Partner of the Year Award Finalists. Serco Inc. Awarded $131M Contract to Support NAVFAC. Immunovaccine Inc.,

Why you need a strong authentication platform

Network World

According to Symantec ’s annual Internet Security Threat Report , up to 80 percent of breaches could be eliminated with strong authentication. Common challenges Image by Pexels As the security landscape is changing, so are the business challenges that organizations are facing. With data breaches and information theft on the rise, it’s becoming even more crucial to protect your data from unwanted third parties.

How to fend off cyberattacks and data breaches

Network World

According to research conducted by Symantec , the number of cyberattacks against small businesses (companies with fewer than 250 employees) has been steadily growing over the last six years, with hackers specifically targeting employees (phishing).

Next-gen IoT botnet Hajime nearly 300K strong

Network World

The Hajime botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as the notorious Mirai botnet that devastated high-profile websites last fall, leading some to think the internet had been broken. An earlier estimate by Symantec put the size at tens of thousands.

Paying the WannaCry ransom will probably get you nothing. Here's why.

Network World

Instead, victims have to wait and hope WannaCry’s developers will remotely free the hostage computer over the internet. The odds of getting back their files decrypted is very small," said Vikram Thakur, technical director at security firm Symantec. Last Friday’s massive WannaCry ransomware attack means victims around the world are facing a tough question: Should they pay the ransom? Those who do shouldn't expect a quick response -- or any response at all.

AT&T, IBM, Nokia join to make IoT systems safer

Network World

Some big players in security and the internet of things, including AT&T and Nokia, are joining forces to solve problems that they say make IoT vulnerable in many areas. The IoT Cybersecurity Alliance , formed Wednesday, also includes IBM, Symantec, Palo Alto Networks, and mobile security company Trustonic. The group said it won’t set standards but will conduct research, educate consumers and businesses, and influence standards and policies.

5 tips to stay ahead of ransomware threats

Network World

According to Symantec's 2016 Internet Security Threat Report (ISTR) , there were more than 4,000 ransomware attacks per day since Jan 1, 2016, a 300-percent increase over 2015, which saw an average 1,000 attacks per day, according to the ISTR. The incidents of ransomware -- especially crypto-ransomware, in which cybercriminals hack vulnerable systems, encrypt the data and hold it for ransom -- saw a huge spike in 2016, and the practice shows no signs of slowing down.

Technology News and Hot Topics

CTOvision

Regin, new computer spyware, discovered by Symantec. Symantec says the bug, named Regin, was probably created by a government and has been used for six years against a range … Read more on BBC News. They understand the potential of the cloud, or the internet of things, but realize that these technologies cannot be … Read more on ZDNet. By Bob Gourley.

Invincea Names Former Verizon Terremark CISO as Chief Operating Officer

CTOvision

He also oversaw managed services as a vice president at VeriSign and Symantec, as a result of the company’s acquisition of Riptech. He holds the distinction of being a co-founder of the Internet Security Advisors Group, the Internet Service Provider Security Working Group (ISPSEC), and serving as global director of information security at UUNET/MCI WorldCom. By Bob Gourley. The news below was posted at Invincea.com.

RSA Conference 2015 – San Francisco 20-24 April 2015

CTOvision

Attendees will receive: Over 30 hours of educational sessions, covering a wide range of topics, including Internet of Things, Supply Chain risk, Threat Intelligence Sharing, Identity Management, Cyber Crime, Mobile Law, Government Policy, Analytics and Forensics, BYOS, Security Operations Center, and many more. Meet representatives from over 400 companies, including sponsors such as Microsoft, Intel, HP, Cisco, Symantec, IBM and more. By Charles Hall.

CIT Hires Robert Stratton as MACH37 General Partner

CTOvision

as Director of Government Research at Symantec Research Labs, and was the first Director of Technology Assessment at In-Q-Tel. Stratton has co-founded or served on the startup staff of several successful information security product and service companies, and established the security organization at UUNET, one of the first commercial Internet service providers. By Bob Gourley Robert Stratton is one of the most positive forces in the east coast tech scene.

Understanding the Security Risks of New Cloud Software

CTOvision

All information traveling between your company network and the servers of your cloud provider exists, if only briefly at times, on the internet, where it could possibly be captured by malicious computers. Security companies like Blue Coat and Symantec have focused their efforts on advanced threat protection that integrates both local and cloud services into the same comprehensive security policy. Carol M. Evenson.

The Sony Hack in Context

CTOvision

Indeed, penetrations of corporate information systems are so widespread, persistent and severe that government agencies and cyber security firms such as Symantec independently estimate America is losing “hundreds of billions” of dollars in intellectual property per year. Today, policymakers in every branch of the US government as well as the press are vulnerable to such attacks if the devices they use connect to the Internet. By Chris Mellon.

LinkedIn Shuts Down Four XSS Flaws, Is wireless the Trojan horse in your network security? and more

CTOvision

IE zero-day vulnerability exploited more widely than previously thought - “A recently announced and yet-to-be-patched vulnerability that affects all versions of Microsoft Internet Explorer (IE) has been exploited in targeted attacks against organizations in Taiwan since the beginning of July, according to security researchers.” By Ryan Kamauff Here are the top cyber news and stories of the day.

Help! I have a Virus!

Sean Daniel

If someone says you need something like McAfee, Symantec, or a paid Antivirus solution, you don’t. I often do a Google Search for “How to Uninstall %insert program name%” and then see what the internet says. emails I get always have screenshots of browsers, and said browser is saying stuff like “you’re internet is slow, you have a virus, run this program!”. A browser should open take you to your home page, and let you get on the Internet. I get this question a lot.

The best malware protection software to guard you from online threats

Mashable VR

Symantec Norton 360 Premium. Kaspersky Internet Security. Every year, cyber criminals get more creative in their attempts to hack your data, steal your information, or spy on you in your home. When a malicious virus is able to replicate itself from one computer file to the next, how can you stop your computer from getting infected? Luckily, there are all kinds of viable software options to detect, prevent, and deter these threats from impacting you.

Are next-generation firewalls legacy technology?

Network World

NGFWs followed in the footsteps of earlier firewalls—physical appliances installed inline to protect private networks from the public Internet. Back then, mobile and remote office workers VPNed into the corporate network and traffic was backhauled for Internet ingress/egress. As cloud computing, SaaS, mobility and broadband networks evolved, mobile and remote worker connection are often dual homed, offering direct connections to the public internet.

Here are some of the best wireless routers you can buy

TechnoBezz

Today, almost all establishments use Wi-Fi for their Internet connection and rely on wireless routers to offer this access. For systems with high-speed internet connections, a wireless router can act as a firewall too. It is compatible with any Internet Service Provider and modem.

Lost In Translation? - Chuck's Blog

Chuck's Blog - EMC

Several competitors are doing better than EMC in backup software (CommVault, Symantec, Veeam, etc.) And I have published 133 of them with storage executives - mainly with CEOs - since the inception of StorageNewsletter, on paper and then on Internet. Internet is a beautiful media, it can ruin a perfectly fine Sunday just with a blog post telling you that you did crappy work. Chucks Blog. An IT industry insiders perspective on information, technology and customer challenges.

Victus pro Scientia Opus -- Food for the Knowledge Worker: SPC 2008 -- BillG Keynote

Victus pro Scientia Opus -- Food for the Knowledge

Although I disagree with how Microsoft characterizes the time-to-value of Microsofts entry-level search tool ("1 hour from download to a configured search engine" -- Im skeptical), Search Server 2008 showed some exciting stuff federated results from both Live.com and an internal (Symantec) Data Vault. Free How Does the Internet See You?

Top 10 Most-Destructive Computer Viruses

Galido

In the age of Internet banking and online shopping, a compromised identity is much more than just a name and social security number: it’s your address, date of birth, mother’s maiden name, and even your secret security questions (your first pet, your favorite teacher, or your best friend from grade school). Slammer (2003) In January 2003, the fast-spreading Slammer proved that an Internet worm could disrupt private and public services, a harbinger for future mayhem.