Latest from Symantec

Machine Data eBook (Security)

Organizations must use every available resource to protect against the latest cyberattacks, the persistent nature of advanced threats, and the ease with which malware can cripple an entire network. One of the most important—and often overlooked—resources that organizations can tap into is machine data. This e-book showcases how three companies are leveraging machine data to […]

Read →

Top 5 SSL Attack Vectors

Explore what the Top 5 ranked ‘SSL Attack Vectors’ are, and the best practises on how to avoid falling victim to such attacks. As sensitive information on websites, intranets and extranets depends on SSL/TLS – they all need encryption to keep company data private and secure. Learn the vulnerabilities of weak SSL encryption and where […]

Read →

Ensuring SSL Compliance in APAC

For those doing business in Australia, New Zealand, Singapore, or in other parts of the Asia Pacific region, privacy is a significant concern. Businesses holding personal data have a responsibility to preserve the privacy and confidentiality of that data. The task is complex, especially in an era of sophisticated, global cyber-crime. Secure Sockets Layer (SSL) […]

Read →

Cybercrime Survival Guide

The web has been overrun by data thieves. In the battle of obtaining your information, ignorance is their greatest weapon, knowledge their greatest foe. Every website owner needs to understand the risks posed by cybercrime and how to prevent them. This essential survival guide will help you navigate the wilds and come out of the […]

Read →

The Hidden Costs Of Self-Signed SSL Certificates

Even when business is booming, smart companies always have an eye on the bottom line. Security is not usually one of the first places companies look to trim expenses, but some IT professionals believe that they can easily lower costs by eliminating third-party Secure Sockets Layer (SSL) Certificate Authorities (CAs) from the budget equation. Although […]

Read →

The Key To Smarter Enterprise Security: Making The Case For Cloud-Based Code Signing In The Enterprise

Code signing is at a crossroads. In many enterprises, the traditional approach remains standard procedure: you purchase a code-signing certificate, download it, and deploy it locally for all your code-signing needs. When carefully managed, this approach can still be very effective in guarding against malware. But recent events have shown that many companies are finding […]

Read →
25,000+
Articles
500K+
Monthly Readers
300+
Sponsors
15+
Years of Insights