article thumbnail

What should you know about the Symantec Split

CTOvision

Enterprise IT and cyber security professionals should all track the recent news of Symantec splitting into two publicly traded firms. Before giving our cut, review the official press release here: Symantec Announces New Strategy to Fuel Growth and Plans to Separate into Two Public Industry-Leading Technology Companies.

Symantec 266
article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to. The Symantec Government Symposium features 10 sessions where attendees will: Explore how agencies can develop a process for incident response prioritization and use actionable intelligence throughout the entire threat lifecycle.

Symantec 261
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Quick Take: Symantec Buys Blue Coat

Network World

When former CEO Mike Brown left Symantec in April of this year, I wrote a blog about what I would do if I were recruited as Mike’s replacement. Hmm, I never even contemplated a big-time merger, so I was as surprised as anyone when Symantec announced its plan to acquire Blue Coat.

article thumbnail

Generative AI and the Transformation of Everything

CIO Business Intelligence

Symantec and generative AI Symantec has a long history with AI. Organizations should feel especially confident when it comes to the threat posed by generative AI systems if they already have a data protection like Symantec Data Loss Prevention Cloud. Key to our focus is protecting user and enterprise IP. Generative AI

Symantec 136
article thumbnail

Implications of generative AI for enterprise security

CIO Business Intelligence

What enterprises need for security Fortunately, there are Generative AI Protection solutions, such as Symantec DLP Cloud, Adaptive Protection on Symantec Endpoint Security Complete (SESC), and real time link in email security that address these emerging challenges and block attacks in different, targeted ways. Generative AI

article thumbnail

Bidding Open on DHS’ $6B Security Hub, House report stresses sharing

CTOvision

Google Play store inundated with scam apps, Symantec says – “A steady stream of questionable applications is flowing daily into Google’s Play store for Android devices, according to security vendor Symantec.” ” Symantec believes that they have found at least 1200 malicious apps in the last seven months.

Symantec 226
article thumbnail

XDR Isn’t Enough to Protect Your Organization: The Importance of Adversary Detection and Response

CIO Business Intelligence

Clearly, it’s time for a new approach — one that helps you stay ahead of the adversary by moving beyond defense-in-depth, reactive detection, and response capabilities to a proactive security strategy powered by threat intelligence. . Proactive defense strategies start with knowing the adversary .