Latest from Symantec

Beyond Blueprints – A Guide to Data Driven Construction

Harness the Power of Data to Transform Traditional Practices Most AEC professionals rely on years of experience and instinct. The advent of a centralized, cloud platform has led to a paradigm shift, with data now driving decisions. Egnyte’s Beyond Blueprints Ebook outlines how to embrace the change and harness the power of data for:• Secure […]

Read →

State of the Cloud: Avoiding the hidden costs

Symantec commissioned ReRez Research to conduct the 2013 Avoiding the Hidden Costs of Cloud Survey in September and October of 2012. They contacted business and IT executives at 3,236 organizations in 29 countries. Respondents came from companies with a range of 5 to more than 5,000 employees. Of the responses, 1,358 came from SMBs and […]

Read →

Website Security Threat Report – Part 2

These resources have offered unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. Symantec’s Website Security Solutions have distilled this information down to focus specifically on the threats that are targeting online business and websites. Join Symantec’s team of as […]

Read →

6 Things That Can Kill Your Website

Your website is your shop front, your brand on display and an essential sales and marketing tool. You spent a lot of money building it and attracting visitors. It is business critical: it would be a disaster if that shop front were smashed, your reputation was tarnished and visitors stopped coming. This is why website […]

Read →

The Ongoing Malware Threat: How Malware Infects Websites And Harms Businesses

This paper explores the still-growing threat of website malware, specifically how hackers compromise websites and how users become infected. The consequences of malware attacks—including Google blacklisting—are also explored, as are new trends in website attacks and what types of malware you need to watch out for on your site. Finally, the paper discusses strategies for […]

Read →

Symantec Website Security Threat Report – Part 1

Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of approximately 69 million attack sensors which record thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec […]

Read →

Cloud Adoption In Asia Pacific: Overcoming Security Concerns With SSL

Cloud computing is a service delivery model that provides on-demand computing and storage services. Clouds may be public and open to all users, private and available only to users within an organization, or a hybrid. Although public clouds offer valuable services for businesses, this cloud model requires sound practices to maintain adequate security. Secure Sockets […]

Read →

Ensuring Ease Of Use With SSL Certificates

Businesses of all sizes face a constantly evolving range of security threats, from sophisticated malware and targeted phishing scams to data leaks and loss of trust with customers. These threats can be especially challenging for small and midsize businesses who typically have limited staff and resources to address security concerns. To support encryption and device […]

Read →

Managing SSL Certificates In Pan-Asia Pacific Enterprises

Businesses across the globe face a wide array of threats to information security. Enterprises in the Asia Pacific region face the same threats while contending with region-specific challenges associated with trade across diverse cultures. Trust in information systems is essential for efficient and profitable business. Enterprises depend on Secure Sockets Layer (SSL) certificates to promote […]

Read →
25,000+
Articles
500K+
Monthly Readers
300+
Sponsors
15+
Years of Insights