MTrends: Beyond the Breach

Drawing from hundreds of real-world incident response engagements by Mandiant, a FireEye Company, the 2014 M-Trends Threat Report reveals key insights, statistics and case studies illustrating how the...
0 comment

Cybersecurity’s Maginot Line: A Real-World Assessment of the Defense-in-Depth Model

This first-of-its-kind study examines data from more than 1,600 FireEye network and email appliances in real-world settings. The FireEye devices were part of more than 1,200 “proof-of-value” trials...
0 comment

FireEye Advanced Threat Report: 2013

The 2013 edition of the FireEye Advanced Threat Report analyses more than 40,000 advanced attacks across the globe to map out the latest trends in advanced persistent threat (APT) attacks. Leveraging...
0 comment

What You Don’t Know Can Hurt You

Organizations today are grappling with an increasingly complex cybersecurity environment. Attacks are coming faster and are more sophisticated, and there are heightened risks from greater information...
0 comment

Ponemon Security Survey

Threat Intelligence & Incident Response:  A Study of U.S. & EMEA Organizations, sponsored by AccessData, surveyed 1,083 CISOs and security technicians in the United States and EMEA about how...
0 comment

Perfect Forward Secrecy: The Next Step in Data Security

With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases. That’s why Symantec is continuing to innovate...
0 comment

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

The online world can be a scary place as the integration of the Internet into everyone’s lives has also brought with it an ever-increasing trend towards malicious activity. Learn how online businesses...
0 comment

Choosing a Cloud Hosting Provider with Confidence: Symantec SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers

Many cloud service providers can deliver the security that enterprises need and SSL (secure sockets layer) certificates are part of the solution. More specifically, SSL is the solution for securing data...
0 comment

Best Practices and Applications of TLS/SSL

TLS (Transport Layer Security), widely known as SSL (Secure Sockets Layer), is the most well known method to secure your website. But it can also be used for much more. Read the white paper, “Best...
0 comment

Beginner’s Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options

Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer...
0 comment