|
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint (The Blueprint in Various Industries)
This is Part Three of the second episode of the The “Building Confidence in Enterprise Security” video podcast series, [See the full post…] |
Watch/download video
|
|
Categories: Connected Social Media, Corporate, Symantec Tags: Andre Gold, Enterprise Security, risk management, Samir Kapuria, Security, Security Blueprint, Symantec
|
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint (Operational and Strategic Elements of the Blueprint)
This is Part Two of the second episode of the The “Building Confidence in Enterprise Security” video [See the full post…] |
Watch/download video
|
|
Categories: Connected Social Media, Corporate, Symantec Tags: Andre Gold, Business Continuity, Enterprise Security, Samir Kapuria, Secure Operations, Security, Security Blueprint, Security Organization, Security Strategy, Symantec, Symantec Security Blueprint
|
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint.
This is Part One of the second episode of the The “Building Confidence in Enterprise Security” video podcast series, featuring Samir Kapuria and Andre [See the full post…] |
Watch/download video
|
|
Categories: Connected Social Media, Corporate, Symantec Tags: Andre Gold, Application Security, data security, Enterprise Security, Samir Kapuria, Security, Security Blueprint, Symantec, System Security
|
In this podcast, Barbara Mitchell, product manager for Verizon Business, provides valuable insight on the Payment Card Industry Data Security Standard, better known as PCI. She explains what the PCI Data Security Standard means for businesses and who is [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Verizon Business Tags: banking, Barbara Mitchell, Financial Services, Payment Card, PCI, Professional Services, retail, Security, Verizon Business
|
This is the final segment of a 3 part podcast interview with Darren Thomson and Jeremy Ward on the Symantec IT Risk Management Report, Volume 2. In this segment, Thomson and Ward provide insights on vertical markets and key findings [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Symantec Tags: Darren Thomson, Information Risk Management, Jeremy Ward, Security, storage, Symantec
|
This is the second segment of a 3 part podcast interview with Darren Thomson and Jeremy Ward on the Symantec IT Risk Management Report, Volume 2. In this segment, Thomson and Ward provide a general overview and key findings of [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Symantec Tags: Darren Thomson, Information Risk Management, Jeremy Ward, Security, storage, Symantec
|
This is the first segment of a 3 part podcast interview with Darren Thomson and Jeremy Ward on the Symantec IT Risk Management Report, Volume 2. In this segment, Thomson and Ward provide a general overview and key findings of [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Symantec Tags: Darren Thomson and Jeremy Ward, Information Risk Management, Security, storage, Symantec
|
The “Building Confidence in Enterprise Security” video webcast series, featuring Samir Kapuria and André Gold, addresses various topics related to enterprise security. Together, they use Symantec’s Security Blueprint as a lens for examining topics that include: IT compliance, IT risk [See the full post…] |
Watch/download video
|
|
Categories: Connected Social Media, Corporate, Symantec Tags: enterprise, Security, Symantec
|
What’s new in security? In this podcast Intel’s Malcolm Harkins and HP’s Manny Novoa chat about the latest issues in security technologies, notably the emergence of hardware assisted virtualization. They also discuss, with PodTech’s Jason Lopez, coping with zero-day threats [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, HPE - Hewlett Packard Enterprise, InfoWorld, Intel, Intel-OpenPort Tags: automated management, HP, HPE, Intel, IntelSecurity, Malcolm Harkins, Manny Novoa, Security, virtualization, zero-day
|
With many data centers built more than a decade ago, facilities no longer fit current and future requirements from a business perspective. In addition, security requirements have evolved exponentially along with capacity issues like power and space shortages. Join BearingPoint [See the full post…] |
Listen/download audio
|
|
Categories: BearingPoint, Connected Social Media, Corporate, Enterprise 2.0 Tags: BearingPoint, data centers, Gabe Leung, Security
|
In this Symantec podcast: As organizations move to Windows Vista, they’ll need a migration strategy that keeps conflicts and system disruptions in check, minimizes user downtime and inconvenience, and doesn’t expose systems to security threats. [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Symantec Tags: Security, Symantec, Vista, Windows
|
SNW Spotlight is your source for the latest information from Storage Networking World, in San Diego.
In this edition of SNW Spotlight, storage in China, and security on your hard drive. Four Chinese journalists opine about what needs to happen [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, SNWSpotlight Tags: China, encryption, HP, HPE, LSI, SAS, Seagate, Security, SNW Spotlight, Storage Networking World
|
As corporations expand and adapt to a mobile workforce, issues of remote access and security have become even more crucial to basic business operations. Peter Silva, a technical marketing manager at F5 Networks, talks about secure remote access and [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, F5 Networks Incorporated, Technology Tags: Disaster Recovery, F5 Networks, Peter Silva, remote access, Security
|
A Symantec Security Response podcast featuring the top blog postings from Symantec Security Response engineers in Janaury 2007. This podcast features blog summaries from Amado Hidalgo, Eric Chien, Dave Cole, Elia Florio, Greg Ahmad & Han Lau.
More information at: [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Symantec, Technology Tags: Amado Hidalgo, Dave Cole, Elia Florio, Eric Chien, Greg Ahmad, Han Lau, Security, Symantec
|
A Symantec Security Response podcast featuring two high-profile zero day vulnerabilities affecting Microsoft and the Broadcom Wireless device driver set. This podcast features a technical discussion of the vulnerabilities and offers listeners insight on likely attack scenarios and mitigating strategies. [See the full post…] |
Listen/download audio
|
|
Categories: Artificial Intelligence, Connected Social Media, Corporate, Security, Symantec, Technology Tags: Broadcom Wireless, Cyber Risk Management, Dave Cole, Microsoft, Orlando Padilla, Patrick Fitzgerald, Security, Symantec, Symantec Security Response, Zulfikar Ramzan
|
A Symantec Security Response podcast featuring a roundup of the top weblog postings from Symantec Security Response engineers in October. This podcast features a summary of weblogs from Jonathan Omansky, Orla Cox, Candid Wueest and Josh Harriman.
More information at: [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Security, Symantec, Technology Tags: Candid Wueest, Cyber Risk Management, Jonathan Omansky, Josh Harriman, Orla Cox, Security, Symantec
|
A Symantec Security Response podcast focused on information-stealing programs designed to gather account information for online games. The goal of this podcast is to help you better understand the threats these programs pose to more than just your online game [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, E3 - Electronic Entertainment Expo, Gaming, Symantec, Technology Tags: online games, Security, Symantec
|
A Symantec Security Response podcast focused on the Internet Security Threat Report Volume X and the historical evolution of threats reported by Symantec over the past 4 years. The goal of this podcast is to provide the listener with an [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: Cyber Risk Management, Security, Symantec
|
A Symantec Security Response podcast focused on the Internet Security Threat Report Volume X and Symantec’s predictions on Future Threats. The goal of this podcast is to provide the listener with an overview of the some of the possible threats [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: Cyber Risk Management, Security, Symantec