Exija más. Saque el mayor partido de la migración a los Firewall de Próxima Generación

A medida que la tecnología de firewall de próxima generación (NGFW – next-generation firewall) se convierte en más convencional, es el momento de revisar las capacidades y funciones avanzadas...
0 comment

Protect Your Brand Against Today’s Malware Threats with Code Signing

The malware threat and resulting lack of confidence on the part of online users puts software developers and other companies that rely on software downloads at risk. Code signing is an industry-recommended...
0 comment

Securing the Mobile App Market

The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also...
0 comment

Protecting PoS Environments Against Multi-Stage Attacks

News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment...
0 comment

Protect Your Applications— and Reputation—with Symantec EV Code Signing

For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed...
0 comment

Securing Your Private Keys as Best Practice for Code Signing Certificates

The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing...
0 comment

Protecting Android™ Applications with Secure Code Signing Certificates

Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build...
0 comment

Website Security in Corporate America

We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, we’re witnessing attacks...
0 comment

The New Prescription for Privacy: Understanding and Meeting Security Requirements

This report looks at the challenges and requirements of protecting confidential patient data online, the risk of security breaches in the world of EHR, and the measures that healthcare organizations must...
0 comment

Protecting Users from Firesheep and Other Sidejacking Attacks with SSL

The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Users on unprotected networks who...
0 comment