93 Results
Sunil ChoudrieSr. Manager, Symantec’s Global Information Protection
Posted: 4 Min Read

Few Phish in a Sea Protected with Email Threat Isolation

While phishing attacks have become more sophisticated, users can now protect themselves in way than was ever previously possible. Here’s how

Few Phish in a Sea Protected with Email Threat Isolation
Nirav ShahManager, Product Marketing
Posted: 3 Min Read

How Do You Protect Users from Themselves?

As organizations struggle with an uptick in weaponized emails, here’s how they can prevent malicious attachments from wreaking untold damage

How Do You Protect Users from Themselves?
Constancio FernandesSr Director, Development
Posted: 3 Min Read

Containing Your Containers – It’s Time to Batten Down the Hatches

Another container security vulnerability - this time around a security hole in Docker's built-in container copy file command, which can be used to hijack server files

Video
Containing Your Containers – It’s Time to Batten Down the Hatches
George TeasSenior Director of Systems Engineering, Symantec
Posted: 3 Min Read

Why a CASB is Essential to any Cloud and Enterprise Security Strategy

CASB deployment is especially critical for government managers as they adopt a mix of cloud infrastructures to address the diverse needs of their missions

Why a CASB is Essential to any Cloud and Enterprise Security Strategy
View More