135 Results
Chris ChowSecurity Awareness Manager, Digital Trust and Safety
Posted: 5 Min Read

Phishing for a Proactive Security Culture

How to drive a measurable reduction in security risk using phishing simulations

Video
Phishing for a Proactive Security Culture
Michael SmithAmericas Incident Response, Symantec Cyber Security Services
Posted: 3 Min Read

Best Practices in Targeted Ransomware Attacks

Against the backdrop of increasing attacks, here’s how to prepare with a bold response playbook and ransomware jump kit

Best Practices in Targeted Ransomware Attacks
Andrew BoreneSenior Director, Federal – National Security Group Symantec
Posted: 3 Min Read

Strengthening National Security through Public-Private Partnerships

Here’s how the National Security Group at Symantec is working with Uncle Sam to help protect its far-flung data networks

Strengthening National Security through Public-Private Partnerships
Leonid BelkindVice President, CTO – Zero Trust, Secure Access Cloud
Posted: 4 Min Read

Not All Data Is Created Equal: Data vs. Actionable Data

Enterprise security is hampered by a preoccupation with collecting data. The focus should be on extracting information to collect actionable data

Video
Not All Data Is Created Equal: Data vs. Actionable Data
Michal Toiba KokhSenior Manager, Product Content
Posted: 9 Min Read

Symantec Mobile Threat Defense: Stop Relying on Delayed and Invasive Protection Actions

When it comes to mobile security, it’s time to move beyond visibility and basic protections. SEP Mobile’s real-time and targeted protection actions provide the most effective defense against mobile threats

Symantec Mobile Threat Defense: Stop Relying on Delayed and Invasive Protection Actions
View More