Symantec Finally Agrees With Everyone Else In The Security Community: Says Antivirus Software Is Dead

CTOvision

As a technologist I have long respected Symantec and their many capabilities (they do far more than antivirus, see the list here). But the hottest firms in cyber security, those growing because they make real, measurable, virtuous differences in enterprise security, are growing because they realized that Symantec''s core antivirus features just are not sufficient.

Phishing campaign exploits Symantec URL Protection to cover its tracks

Tech Republic Security

The email also claims to have been scanned by Symantec email security, according to security provider Armorblox

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

By Bob Gourley DC seems to have a cyber security related event every week. All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to. Here are details from the invite: Don’t miss this exciting opportunity to join 1500 IT leaders and innovators on March 11 to collaborate and discuss the top issues in IT security and management. Learn how agencies are turning to BYOD to ensure security and ROI.

Fortinet, Palo Alto Networks, McAfee and Symantec Found the Cyber Threat Alliance

CTOvision

In what could be a very virtuous trend, four of the cyber security industry’s leading tech vendors (Fortinet, Palo Alto Networks, McAfee and Symantec) have established a consortium focused on the furtherance of the art and science of cyber threat intelligence. By raising the industry’s collective actionable intelligence, alliance participants will be able to deliver greater security for individual customers and organizations. Symantec (NASDAQ: SYMC ).

What should you know about the Symantec Split

CTOvision

Enterprise IT and cyber security professionals should all track the recent news of Symantec splitting into two publicly traded firms. Before giving our cut, review the official press release here: Symantec Announces New Strategy to Fuel Growth and Plans to Separate into Two Public Industry-Leading Technology Companies. Separation to Increase Focus and Strategic Flexibility for both Security and Information Management Businesses.

Big Data News: Symantec Picks Splunk for Enterprise Security Tool

Data Center Knowledge

Looker Datafold Engine empowers analysts with more meaningful insights through its in-database architecture, Symantec uses Splunk software to boost its security intelligence operations, and CommVault''s Simpana 10 software has achieved certified integration with the SAP HANA platform. Big Data commvault looker sap splunk Symantec

Symantec to Buy Security Software Firm Blue Coat for $4.65B

Data Center Knowledge

Blue Coat product suite can strengthen Symantec in areas of cloud data protection, digital forensics, management of encrypted network traffic Read More. Deals Security

Symantec looks to up the ante on SMB security with Endpoint Protection Cloud

Tech Republic Security

A new security product from Symantec hopes to better secure small businesses against ransomware and other targeted cyberattacks

Quick Take: Symantec Buys Blue Coat

Network World

When former CEO Mike Brown left Symantec in April of this year, I wrote a blog about what I would do if I were recruited as Mike’s replacement. While one of my suggestions was for Symantec to resume M&A activities, I was really thinking about a strategy for filling in product gaps – perhaps Symantec could pick up LogRhythm to add a leading SIEM to its portfolio, or grab Carbon Black for endpoint security analytics and forensics.

Symantec Joins OpenStack Foundation as Gold Member

Data Center Knowledge

Security software firm has already been important contributor to open source cloud project Read More. Cloud Computing Security

Cloudflare Hires Ex-Symantec Finance Chief in Move Toward IPO

Data Center Knowledge

Network security company aiming to be ready for IPO next year Read More. Business Cloud Investing Startups

White House Tightens Security for Web Access

CTOvision

On Monday, 8 June 2015, Tony Scott, Chief Information Officer for President Obama, issued a memorandum that requires all federal websites and services to switch to HTTPS , a more secure method of connection than plain HTTP , by December 31, 2016. It is generally thought that, in addition to improving overall security, the move to HTTPS will also improve privacy , as it becomes much more difficult to determine the identity of someone browsing to a particular web site.

Symantec to acquire Blue Coat for $4.65 billion

Network World

Security company Symantec is to acquire Web security provider Blue Coat for US$4.65 billion in cash in a deal that will broaden the portfolio of security technologies the combined company can offer customers as they move to the cloud. The deal, which is expected to be closed by the third quarter, will also see Greg Clark, CEO of Blue Coat, taking over as CEO of Symantec and joining its board at the the closing of the transaction.

Symantec will acquire identity protection firm LifeLock in $2.3B deal

Network World

Aiming to boost its consumer security business, Symantec is acquiring LifeLock, a vendor of identity protection services, for US$2.3 The deal will create what the two companies described as the world’s largest consumer security business with over $2.3 The immediate opportunity for Symantec comes from the large number of consumers worldwide that have been victims of cybercrime, generating as a result greater user concern in digital safety.

FireEye, Symantec Jump as Ransomware Hack Seen Boosting Spending

Data Center Knowledge

Business Investing Manage SecurityAttacks seen as ‘wake-up call’ for governments, companies Read More.

We Are Living In The Age of the Mega-Breach

CTOvision

Every year for 19 Years Symantec has produced an Internet Security Threat Report, capturing insights which can inform defenses. Symantec is known for their Global Intelligence Network , a monitoring capability made up of more than 41 million attack sensors. Here is how they describe this network: Symantec’s Global Intelligence Network is made up of more than 41.5 Symantec also found that the length of these campaigns was three times longer than campaigns in 2012.

Travelers enlists Symantec to advise cyber insurance customers

Network World

The Travelers insurance company has teamed up with Symantec to give policyholders cyber security assessments and consultation in order to help them manage risks. The self-assessment consists of filling out a 25-question survey and getting a written report of how well their network and data protection stacks up. If they want to, they can talk to a consultant who walks them through the results and recommends steps they could take to remediate risks.

Here are 5 reasons Symantec is buying Blue Coat

Network World

As cyber threats diversify and expand, anti-virus provider Symantec is doing the same. billion to acquire Web security provider Blue Coat. Here are five reasons the deal could make sense for Symantec. Threats are evolving, Symantec needs to as well Symantec has been selling PC antivirus products for years but the PC market has slumped and cyber threats are getting sneakier and more malicious.

Bidding Open on DHS’ $6B Security Hub, House report stresses sharing

CTOvision

The fact that more key sensors in ICS systems are found to be vulnerable is evidence of the inherent weaknesses in these systems and the need to secure them. Bidding is Open for the DHS’ $6 billion Security Hub – “The US Department of Homeland Security is putting into motion its plans to create a $6 billion repository for continuous monitoring security tools to be used by federal, state and local agencies.” Via Net Security, more here.

A critical flaw in Symantec antivirus engine puts computers at risk of easy hacking

Network World

The antivirus engine used in multiple Symantec products has an easy-to-exploit vulnerability that could allow hackers to easily compromise computers. The flaw was fixed by Symantec in Anti-Virus Engine (AVE) version 20151.1.1.4, released Monday via LiveUpdate. According to Google security engineer Tavis Ormandy, who found the flaw, the vulnerability can be exploited remotely to execute malicious code on computers.

Symantec and Kaspersky Labs Banned from China as Government Obliged to Choose Domestic Security Software

Data Center Knowledge

Government procurement agency excludes two firms from security software supplier list. Read More. Shared

Wormable flaws in Symantec products expose millions of computers to hacking

Network World

A Google security researcher has found high severity vulnerabilities in enterprise and consumer products from antivirus vendor Symantec that could be easily be exploited by hackers to take control of computers. Symantec released patches for the affected products, but while some products were updated automatically, some affected enterprise products could require manual intervention.

5 Simple Yet Effective Ways to Increase Data Security

CTOvision

Symantec, in fact, recently released […]. Business data is more than propriety information. Most small businesses hold customer credit card information on file and maintain electronic employee records, as well as manage their banking online. And a breach of this data disrupts basic operations and damages your reputation not to mention probably costing you thousands of dollars.

AFCEA Defensive Cyber Operations Symposium 5-7 May 2015 at Baltimore Convention Center

CTOvision

If you''re interested in cyber security and operations at the federal level, check out the AFCEA Defensive Cyber Operations Symposium. The agenda is packed with information about cyber security, plus continuing education opportunities. Sponsors include a broad range of companies, such as IBM, Cisco, Intel, Leidos, BAE, Solarwinds, Symantec, NES, Informatica, and Teradata. By Charles Hall.

Barracuda, ReversingLabs, Telefonica and Zscaler Join Cyber Threat Alliance

CTOvision

February 13, 2015 – Fortinet (NASDAQ: FTNT), McAfee Labs, Palo Alto Networks® (NYSE: PANW) and Symantec (NASDAQ: SYMC), co-founders of the industry’s first cyber threat alliance, today announced that Barracuda Networks, Inc. By raising the industry''s collective actionable intelligence, alliance participants will be able to deliver greater security for individual customers and organizations. "We ABOUT MCAFEE LABS, PART OF INTEL SECURITY. ABOUT SYMANTEC. By Bob Gourley.

Fed Tech Roundup August 27

CTOvision

Northrop Grumman M5 Network Security Wins Eureka Prize for Outstanding Science for Safeguarding Australia. Symantec takes on the Internet of unsecured things - GCN.com. News Aircraft FAA Navy Symantec Unmanned aerial vehicleThe following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. Army tries to speed cyber acquisition process - FCW.com. State Dept.

G7 sets financial sector cyber defence guidelines as attacks grow

Computer Weekly

G7 countries have agreed cyber security guidelines in response to concerns about the safety of interconnected global financial systems that are increasingly coming under attack, according to Symantec

Six ERP Security Risks to Watch

IT Toolbox

A recent security report by Symantec found that small firms now make up 43 percent of all cyber attacks, and manufacturers are some of the hardest hit. Cyber attack on smaller firms, especially manufacturers, is on the rise. ERP systems can make a particularly tempting target, because they

Strider cyber attack group deploying malware for espionage

Computer Weekly

Symantec security researchers have uncovered a spying campaign by a previously unknown group using modular malware as stealthware

Understanding the Security Risks of New Cloud Software

CTOvision

However, some concerns about cloud security risks appeared early in the industry and are still relevant today. Both providers and customers must ensure that all data transfers occur over secure channels. You should only connect to URLs beginning with "https", a more secure protocol than traditional "http" sites. Your data should be securely stored on the provider's computers—not only in database or file storage, but in application processing. Carol M. Evenson.

Cisco buys Cloud Security Gateway vendor CloudLock for $293M

Forrester IT

Given Symantec's recent acquisiton of BlueCoat (and with it BlueCoat's earlier acquired Elastica and Perspecsys cloud security gateway (CSG) assets), and IBM's organic buildout of its Defender CSG solution it comes hardly as a surprise that Cisco today announced its intent to acquire CloudLock for US$293M (in Forrester's estimation this purchase price represents at least 10-15x of CloudLock's current revenues). Security and Risk

Microsoft disrupted Trickbot, a ‘prolific’ ransomware distributor and election security threat

GeekWire

“We have now cut off key infrastructure so those operating Trickbot will no longer be able to initiate new infections or activate ransomware already dropped into computer systems,” Microsoft security exec Tom Burt wrote in the blog post. Microsoft cybersecurity Election Security

Portland startup DeepSurface Security raises $1M to help companies assess vulnerabilities

GeekWire

DeepSurface Security co-founders Tim Morgan, CTO, and James Dirksen, CEO. based startup DeepSurface Security raised $1 million to help companies analyze vulnerabilities on their enterprise networks. Portland Startups deepsurface security Funding fundraising Venture capital

Oracle leverages machine learning to manage, secure enterprise systems

Network World

Oracle is not the first company that comes to mind when you think of enterprise security, but the company announced at its recent OpenWorld conference new products with artificial intelligence (AI) and machine learning capabilities to quickly identify security threats. The company introduced two new sets of integrated suites called Oracle Identity Security Operations Center (SOC) and Oracle Management Cloud.

Mobile App Development in the Enterprise: What’s Next?

The Investing Edge

For those companies grappling with app development, management, security, and more, we will host our third B2B IT Forum, “The New Mobile Reality: App Strategies for the Enterprise,” on Tuesday, March 12 at the Microsoft NERD Center in Cambridge, Mass. Our panel will bring informed perspectives on designing, developing, managing, measuring and securing mobile apps, as well as usage of mobile apps for enterprises of all sizes across their customers, employees and partners.

Security and cloud vets raise $20M for incident response automation startup StackPulse

GeekWire

The trio previously co-founded Luminate Security, which was acquired by Symantec in 2019. StackPulse CEO Ofer Smadari. StackPulse Photo). As companies rely more heavily on cloud-based services, software outages can be much more painful and detrimental. StackPulse wants to help.

Experts Tackle Enterprise Mobility at Latest B2B IT Forum

The Investing Edge

BYOD and ensuring the security of sensitive data: It’s imperative to define the information you are trying to contain and protect. Only a small percentage of the audience knew of a BYOD security policy in place at their organizations; comparatively, nearly all acknowledged that BYOD was the norm at their company. Despite the monumental traffic on Tuesday night (where did that come from?!?),

B2B 101

LinkedIn Shuts Down Four XSS Flaws, Is wireless the Trojan horse in your network security? and more

CTOvision

IE zero-day vulnerability exploited more widely than previously thought - “A recently announced and yet-to-be-patched vulnerability that affects all versions of Microsoft Internet Explorer (IE) has been exploited in targeted attacks against organizations in Taiwan since the beginning of July, according to security researchers.” Is wireless the Trojan horse in your network security? Secure wireless networks can make local critical business applications possible.

National Cybersecurity = Cloud Computing Security

Cloud Musings

According to Symantec, cyberattacks on small businesses rose 300 percent in 2012 from the previous year ( [link] ). With this, national cybersecurity will essentially be synonymous with national cloud computing security. This self-paced training exercise provides an introduction to securing your information. A recent article Inc.com article claimed that the percentage of U.S.

PcTechmate: Automating repair of malware ridden systems

CTOvision

The most recent reports from Symantec and McAfee have publicly said “Do not rely solely on our products to protect your computer.” Company Security Companies Problem: Everyone is in agreement that today’s antivirus software alone is no longer a viable solution by itself. Signature based solutions are being bypassed by malware every day. Face it, the bad guys are winning. The pervasiveness and sophistication of modern malware is damaging computers to a point where expert int.

Insights Into The Black Market For Healthcare Data

CTOvision

Lets start with some good news: Sometimes problems can only be solved after there is widespread situational awareness, and now that cyber security and cyber threats are going mainstream, more and more people are being made aware of how serious this threat of stolen health care data is. Some of what they discussed includes: Security experts say health data is showing up in the black market more and more. Cyber Security Anthem (insurance) Identity theft By Bob Gourley.

Leon Panetta Warns of Cyber Pearl Harbor: and a CTO gives him a polite earful

CTOvision

By Bob Gourley Leon Panetta spoke today at the Symantec government conference in DC. He held the attention of an audience of 2000 with a great overview of the state of national security, including threats, and as far as I can tell did that perfectly. He reviewed threats by nations and threats by type, including, of course cyber security threats. This was, afterall, a conference of cyber security professionals.

Suspected CIA spying tools linked to hacks in 16 countries

Network World

The suspected CIA spying tools exposed by WikiLeaks have been linked to hacking attempts on at least 40 targets in 16 countries, according to security firm Symantec. The tools share “close similarities” with the tactics from an espionage team called Longhorn, Symantec said in a Monday post. Longhorn has been active since at least 2011, using Trojan programs and previously unknown software vulnerabilities to hack targets.