Fortinet, Palo Alto Networks, McAfee and Symantec Found the Cyber Threat Alliance


In what could be a very virtuous trend, four of the cyber security industry’s leading tech vendors (Fortinet, Palo Alto Networks, McAfee and Symantec) have established a consortium focused on the furtherance of the art and science of cyber threat intelligence. McAfee and Symantec join Cyber Threat Alliance ( Security Rivals McAfee, Symantec Join Cyber Threat Alliance ( Palo Alto Networks (NYSE: PANW ). By Bob Gourley.

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC


All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to. The Symantec Government Symposium features 10 sessions where attendees will: Explore how agencies can develop a process for incident response prioritization and use actionable intelligence throughout the entire threat lifecycle. Event attendees will also hear about how to securely manage big data, cloud computing, mobility, social networking, critical infrastructure and more!


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Symantec to Buy Security Software Firm Blue Coat for $4.65B

Data Center Knowledge

Blue Coat product suite can strengthen Symantec in areas of cloud data protection, digital forensics, management of encrypted network traffic Read More. Deals Security

Cloudflare Hires Ex-Symantec Finance Chief in Move Toward IPO

Data Center Knowledge

Network security company aiming to be ready for IPO next year Read More. Business Cloud Investing Startups

Travelers enlists Symantec to advise cyber insurance customers

Network World

The Travelers insurance company has teamed up with Symantec to give policyholders cyber security assessments and consultation in order to help them manage risks. The self-assessment consists of filling out a 25-question survey and getting a written report of how well their network and data protection stacks up. More on Network World: Synack: Hackers wanted after firm gets $21.25M funding from Microsoft, HPE + To read this article in full or to leave a comment, please click here

Unusual Malware May Infect IoT Devices to Protect Them: Symantec

Data Center Knowledge

Infected devices connect to peer-to-peer network that distributes threat updates Read More. Shared

We Are Living In The Age of the Mega-Breach


Every year for 19 Years Symantec has produced an Internet Security Threat Report, capturing insights which can inform defenses. Symantec is known for their Global Intelligence Network , a monitoring capability made up of more than 41 million attack sensors. Here is how they describe this network: Symantec’s Global Intelligence Network is made up of more than 41.5 Mobiles on cyber attack target in 2015: Symantec (

Barracuda, ReversingLabs, Telefonica and Zscaler Join Cyber Threat Alliance


February 13, 2015 – Fortinet (NASDAQ: FTNT), McAfee Labs, Palo Alto Networks® (NYSE: PANW) and Symantec (NASDAQ: SYMC), co-founders of the industry’s first cyber threat alliance, today announced that Barracuda Networks, Inc. Unlike pure-play network security providers, Fortinet can solve organizations'' most important security challenges, whether in networked, application or mobile environments - be it virtualized/cloud or physical. ABOUT PALO ALTO NETWORKS.

Fed Tech Roundup August 27


Northrop Grumman M5 Network Security Wins Eureka Prize for Outstanding Science for Safeguarding Australia. Symantec takes on the Internet of unsecured things - News Aircraft FAA Navy Symantec Unmanned aerial vehicleThe following are some of the hot topics in the federal technology ecosystem (from and ): Fed Tech Ticker. Army tries to speed cyber acquisition process - State Dept.

Bidding Open on DHS’ $6B Security Hub, House report stresses sharing


Five charged with stealing 160+ million credit card numbers – “A federal indictment made public in New Jersey charges five men with conspiring in a worldwide hacking and data breach scheme that targeted major corporate networks, stole more than 160 million credit card numbers, resulted in hundreds of millions of dollars in losses and is the largest such scheme ever prosecuted in the United States.” By Ryan Kamauff Here are the top news and stories of the day.

Tech News Roundup April 13


as Authorized Network Services Provider. Symantec: A Zero-Day discovered every week last year - FedScoop. News Facebook Jeff Bezos NASA STEM SymantecKatie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. Noblis Among 2016 SECAF Small Business Partner of the Year Award Finalists. Serco Inc. Awarded $131M Contract to Support NAVFAC. Immunovaccine Inc., Leidos to Collaborate on Zika Vaccine.

LinkedIn Shuts Down Four XSS Flaws, Is wireless the Trojan horse in your network security? and more


” LinkedIn is one of the top professional networking sites in the world. Is wireless the Trojan horse in your network security? ” Protecting wireless networks is something that absolutely needs to be prioritized in the near future. Secure wireless networks can make local critical business applications possible. At the same point, they can be great weaknesses in the network security paradigm.

Cybersecurity alliance promoting intel-sharing seeks to expand

Network World

Rivals including Fortinet, Intel Security, Palo Alto Networks and Symantec originally entered into the alliance over two years ago, even as doubts arose over whether it’d last. Hackers have probably had a harder time slipping past your security software, thanks to an alliance between some of the top vendors in the industry.

Microsoft disrupted Trickbot, a ‘prolific’ ransomware distributor and election security threat


The “malware-as-a-service” is used to serve nation-states and criminal networks, Microsoft said. based tech giant worked with FS-ISAC, ESET, Lumen’s Black Lotus Labs, NTT and Symantec, a division of Broadcom, to help disrupt Trickbot. Microsoft CEO Satya Nadella.

AT&T, IBM, Nokia join to make IoT systems safer

Network World

The IoT Cybersecurity Alliance , formed Wednesday, also includes IBM, Symantec, Palo Alto Networks, and mobile security company Trustonic. But the potential weaknesses are much broader, spanning the network, cloud, and application layers, the new group said in a press release. Some big players in security and the internet of things, including AT&T and Nokia, are joining forces to solve problems that they say make IoT vulnerable in many areas.

Cybersecurity Goes Private: McAfee and RSA

Network World

Just a few months ago, Symantec bought Blue Coat taking a private company public and forming a cybersecurity industry colossus in the process. Cybersecurity vendors like Cisco and IBM that fit this description are doing quite well in the enterprise so McAfee and RSA (as well as Forcepoint, Palo Alto Networks, Symantec, Trend Micro, and a few others) could join this exclusive club. There are some interesting industry dynamics going on in the cybersecurity market.

Review: Top tools for preventing data leaks

Network World

But what about the sensitive data that lives inside your network? DLP can protect core network stores as well as connected endpoints which might have confidential information. Symantec was invited to participate, but declined. Most security tools are focused on keeping external attackers at bay. How do you make sure it doesn’t get out, either intentionally or by accident? That’s where Data Loss Prevention (DLP) comes into play.

Portland startup DeepSurface Security raises $1M to help companies assess vulnerabilities


based startup DeepSurface Security raised $1 million to help companies analyze vulnerabilities on their enterprise networks. DeepSurface Security co-founders Tim Morgan, CTO, and James Dirksen, CEO. DeepSurface Photos). Portland, Ore.-based

RSA Conference 2015 – San Francisco 20-24 April 2015


Seven hours of high level networking. Access to key sponsors and more than 350 exhibitors, including Napatech, Ixia, Intel, Splunk, Cisco, FireEye, CA Technologies, Bromium, Damballa, the FBI, MITRE, Northrop Grumman, NSA, Palo Alto Networks, Radiant Logic, QuintessenceLabs, VMWare, FireMon, Mandiant, ManageEngine, Microstrategy, Vormetric, and TripWire. Meet representatives from over 400 companies, including sponsors such as Microsoft, Intel, HP, Cisco, Symantec, IBM and more.

Raindrop Malware Discovered in SolarWinds Breach

SecureWorld News

The main difference is that Teardrop is delivered through the Sunburst backdoor, while Raindrop is used to spread across the victim's network. Symantec was able to do some digging into SolarWinds and had some interesting findings.

GovLoop Releases Report: Winning the Cybersecurity Battle


Additionally, the report includes an interview with Dan Lohrmann, Chief Information Security Officer, Michigan, an overview of the federal government cybersecurity landscape, interviews with industry experts from Dell, Juniper Networks, SolarWinds and Symantec. By Pat Fiorenza As part of the Agency of the Future Series, GovLoop has released the report, “ Winning the Cybersecurity Battle. Today, the world is interconnected like never before.

Report 179

Leon Panetta Warns of Cyber Pearl Harbor: and a CTO gives him a polite earful


By Bob Gourley Leon Panetta spoke today at the Symantec government conference in DC. Real threats are in our networks right now. No matter what your politics are, I hope you see this man as a great American who always puts country above himself. I believe that. He has spent his entire adult life proving that. He is a fantastic speaker.

A Primary Goal of an Agile Data Center – Portability

Eric D. Brown

Having the ability to move applications, data and even workloads from the data center to the cloud (or to other data centers within your organization) is vital to ensuring that your systems and networks are optimized and running as efficiently as possible. This post is brought to you by Symantec and The Transition To The Agile Data Center.

Agile 152

Understanding the Security Risks of New Cloud Software


All information traveling between your company network and the servers of your cloud provider exists, if only briefly at times, on the internet, where it could possibly be captured by malicious computers. Security companies like Blue Coat and Symantec have focused their efforts on advanced threat protection that integrates both local and cloud services into the same comprehensive security policy. Carol M. Evenson.

Are next-generation firewalls legacy technology?

Network World

A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. These devices combined traditional L3/L4 packet filtering with deep packet inspection, IPS, and other network security services along with knowledge about users and applications. This broad functionality packaging changed the network security paradigm—everyone needed, or at least wanted a NGFW at the perimeter or within the internal network.

Building the Agile Data Center

Eric D. Brown

The data center exists to provide an organization with the networking, storage, processing and connectivity features needed to operate in the fast paced, data-driven world we live in today. Systems and applications were continuously added to the data center to the point where many data centers were completely full with no room for add new hardware to support growing needs for processing, storage and network capabilities.

Agile 171

The Sony Hack in Context


Indeed, penetrations of corporate information systems are so widespread, persistent and severe that government agencies and cyber security firms such as Symantec independently estimate America is losing “hundreds of billions” of dollars in intellectual property per year. As this case so amply demonstrates, even a single network breach can have profound impacts on national security. The method involved hacking into Sony’s computer network and threatening movie distribution companies.

The Month of July: Monthly Update 7-1-2019

Linux Academy

The first is the launch of a new study group called the Symantec Threat Report Run Down ! The study group goes over what Symantec saw as the biggest threat vulnerabilities in 2018. This course guides the student through implementing network policy and then goes through the administrative steps necessary to build, launch, and maintain a secure Kubernetes Cluster.

Can you hack the vote? Yes, but not how you might think

Network World

With Donald Trump already talking about the presidential election being rigged, Symantec has set up a simulated voting station that shows how electronic systems might be hacked to alter actual vote tallies for just a few hundred dollars. More on Network World: Was Trump bitten by Twitter time-stamp bug that stung Alec Baldwin’s wife?

Here are some of the best wireless routers you can buy


Some models can also operate in wired LAN’s and mixed networks. These routers are ideal for home and small office networks. The Guest Network access feature ensures that the router is worth being thought of by those who wish to give their guests a separate safe connection.

Free Cloud Courses at Linux Academy — July 2019

Linux Academy

Principal Systems Engineer from Symantec Corporation and Ell Marquez for a Threat Report Rundown. Linux Academy Study Group July 2019: Symantec Threat Report Rundown. This course also covers container networking including inter-container communication, managing container networks, and exposing container ports on the host. To continually support you in your mission to learn and grow we are always adding new courses and resources.

Fountainhead: What Is Meant by a "Cloud-Ready" Application?


unique network topology (including load balancing, firewalls, etc.). location of app images and VMs), network (including load balancing and. We all know that large software and platform vendors (think: Oracle, SAP, Microsoft, Symantec, Citrix, CA, IBM, HP etc.) That might mean continuous orchestration between specific apps and networking, storage, firewalls, IaaS, DBs and more. skip to main | skip to sidebar. Fountainhead.

The Hacker Mind Podcast: Hacking Healthcare


For example, in March of 2016, two researchers, Mike Ahmadi and Billy Rios independently reported an astounding fourteen hundred vulnerabilities to CareFusion's Pyxis SupplyStation, an automated, networked, supply cabinet used to store and dispense supplies. !! The New Hub for Government Cloud Computing

Cloud Musings

Symantec. Training and education information from the National Cloud Technologist Association and Cloud Best Practices Network. Cloud Musings by Kevin L. Jackson. Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. Pages. Cloud Musings on Forbes. NJVC Cloud Computing. GovCloud Daily. GovCloud Presentations. GovCloud on Facebook. Get "Cloud Musings" by RSS. Posts. Posts. Comments. Comments.

4 Solution Areas

Transparent Office

Moreover, sales reps are always reaching out to each other to ask questions, post observations, and pick up on the latest "buzz" from around the network. Traditional collaboration across sales networks is rife with inefficiency and missed business opportunity. By creating a "one-stop shop" for the sales network, managers can greatly improve both the dissemination of critical information to the field, and the organized capture of critical information from the front lines.

Lost In Translation? - Chuck's Blog

Chuck's Blog - EMC

Several competitors are doing better than EMC in backup software (CommVault, Symantec, Veeam, etc.) Avamar is doing quite nicely, Networker hangs in there. Chucks Blog. An IT industry insiders perspective on information, technology and customer challenges. Archives. Profile. Subscribe. « When Big Data Changed Marketing At EMC | Main. There Is No Automation Pill » December 05, 2012. Lost In Translation? [tech]: Announcing the next releases of Windows.

Sean Daniel

We have been working with a lot of partners with SBS Aurora such as Symantec, Level Platforms and Disk Keeper are all making statements this week around plans to integrate products with SBS Aurora. How to Stay Safe on Public Wi-Fi Networks. [tech]. Technology Tips, Tricks & News Home | Technical Blog |. Photo Blog | E-Mail Me. Monday, July 12, 2010. Announcing the next releases of Windows Small Business Server.

SMB 44

Top 10 Most-Destructive Computer Viruses


Once thought of as a tool for amateur hackers, PoisonIvy has been used in sophisticated attacks against dozens of Western firms, including those involved in defense and chemical industries, according to a white paper written by Symantec, the computer security firm. Slammer works by releasing a deluge of network packets, units of data transmitted over the Internet, bringing the Internet on many servers to a near screeching halt.