Security Blogs

In Defense of DataRSS
In Defense of Data is a resource for news and views from the frontlines of data protection. Here you’ll discover trends and insight into data security topics such as encryption, data loss prevention and recovery, data leaks and breaches, mobile security, compliance and the ever-changing regulatory landscape surrounding data protection.
- Preventing Data Breaches | 25 Apr 2014
- Data Breach Trends | 01 Jan 2014
- Global Lessons from California Breach Report | 16 Sep 2013
- HIPAA Final Rule: An Opportunity to Boost Data Breach Immunity | 08 Aug 2013
- Mistakes are costing companies millions from avoidable data breaches | 05 Jun 2013
- 5 Pieces of DLP Advice You Can’t Afford to Ignore | 08 May 2013
- Save the Date: #ISTR Twitter chat on Symantec Internet Security Threat Report | 26 Apr 2013
- 2013 ISTR Shows Changing Cybercriminal Tactics | 16 Apr 2013
- Enterprises Can Learn a Thing or Two about IP Theft from Department Stores | 03 Apr 2013
- Protecting Reputation, Business and Customers in Today’s Extended Vendor Ecosystem | 21 Mar 2013

Symantec Security Insights BlogRSS
Symantec thought leadership on security trends, innovation, and ideas, as well as hot tips from security experts.
- U.S. Banks Breached in Cyberattack: What Bankers Should Do To Stay Protected | 28 Aug 2014
- Backoff Trojan Is Back: Protect Your Business From The Next POS Breach | 22 Aug 2014 | 1 Reply
- What’s New in the Spam Market? | 20 Aug 2014
- Protecting Your Virtual Network | 20 Aug 2014
- The Market for Online Credentials | 18 Aug 2014
- Mobile Attacks: Cybercriminals' New Cash Cow | 11 Aug 2014
- Renting a Zombie Farm: Botnets and the Hacker Economy | 08 Aug 2014
- Phishing Post Mega Breach: How The Loss of PII is Only the Start of Your Customers’ Problems | 08 Aug 2014
- Hacking for Bitcoins | 06 Aug 2014
- Beyond the Nigerian Prince: Modern 419 Scams | 06 Aug 2014

Website Security SolutionsRSS
Website Security Solutions allow companies and consumers to engage in communications and commerce online with trust and confidence. With more than one and a half million web servers using our SSL certificates, an infrastructure that processes more than four and a half billion certificate checks daily, and a trust mark that is seen more than half a billion times a day in 170 countries, the Norton Secured seal is the most recognized symbol of trust on the Internet.
- The Future of SSL Encryption | 17 Sep 2014
- クロスサイトリクエストフォージェリ(CSRF, CWE-352) の解説 | 17 Sep 2014
- ディレクトリトラバーサル(CWE-22)の解説 | 17 Sep 2014
- Google’s SHA-1 Deprecation Plan for Chrome | 16 Sep 2014
- Extended Validation Solutions for SMB Ecommerce success: Secure128 | 11 Sep 2014
- Better Website Security and Google Search Rankings for SMB’s with Always On SSL. | 18 Aug 2014
- Types of SSL certificates – choose the right one | 11 Aug 2014
- Apache Struts 1 & 2 の脆弱性(S2-020、CVE-2014-0114等) | 12 Jun 2014
- Perfect Forward Secrecy | 08 May 2014 | 1 Reply
- Heartbleed, Y2K and misplaced worry. | 16 Apr 2014 | 1 Reply

Authentication (User) BlogRSS
User Authentication solutions provide two-factor authentication, public key infrastructure (PKI) services, and risk-based authentication to protect interactions between consumers, business partners, and employees. User Authentication solutions are delivered as cloud-based solutions, enabling enterprises to add strong authentication to applications, networks, and devices without the capital cost of hardware and software associated with traditional strong authentication solutions.
- Russian cybercrime team - another reason to use VIP | 18 Aug 2014
- Managed PKI Enhanced with Self-Service Portal! | 27 Jun 2014
- Want Better Security? Make Authentication Easy. | 27 Jun 2014
- Hardware Protected Mobile Applications are the Wave of the Future | 17 Jun 2014
- Silicon Valley Business Journal says "the era of the password is over" | 28 May 2014
- Bitly Breach Underscores Need for Two-Factor Authentication | 13 May 2014
- Look No Hands - Killing the Password | 08 May 2014
- Learn something NEW about Authentication at Vision | 02 May 2014
- Symantec VIP Update: Push for customer facing mobile applications | 29 Apr 2014
- Heartbleed: Wake-up call for Two-Factor Authentication | 17 Apr 2014

Encryption BlogRSS
The Encryption Blog is where you will find updates on Symantec’s encryption products, commentary on important trends in data protection, and important product-related security alerts and notifications.
- TrueCrypt Migration to Symantec Encryption Desktop | 06 Jun 2014 | 6 Replies
- Symantec Encryption Product Updates | 17 Sep 2013 | 13 Replies
- SEE FDE “FlexChoice” to SDE | 10 Jun 2013 | 1 Reply
- Symantec Encryption: What's New? | 28 Jan 2013
- The Latest Urban Legend: Cracking PGP Whole Disk Encryption (again…and again…) | 20 Dec 2012 | 4 Replies
- Cloud Encryption – Who’s Really Responsible? | 18 Dec 2012 | 3 Replies
- Securing Cloud Storage: Balancing the Need to Share and Protect Data | 31 Oct 2012 | 3 Replies
- Encryption for a Mobile World | 31 Oct 2012 | 1 Reply
- On Trust | 04 Oct 2012 | 1 Reply
- Hello and Welcome | 04 Sep 2012 | 1 Reply

Endpoint Security BlogRSS
The Endpoint Security Blog is the perfect place to get news addressing global endpoint security, insights from our relationships with government and cyber security industries, and hearing from our think-tank of experts regarding your world, your protection.
- Beyond Heartbleed: Protecting Your Business with Symantec | 02 Jun 2014
- The Consumerization of IT Has Built B2Both | 30 May 2014
- What Endpoint Protection Customers Need to Know About Windows XP End-of-Support | 25 Apr 2014 | 3 Replies
- How will the end of Windows XP impact your organization? | 04 Mar 2014 | 7 Replies
- Security Advisory for SEP Management Vulnerabilities | 13 Feb 2014 | 18 Replies
- To Protect Your POS, Add Layers | 22 Jan 2014
- The Halo Effect & What Businesses Need to Know about Macs, Malware & Security Myths | 19 Nov 2013 | 4 Replies
- Symantec Receives Eight Honors from Information Security magazine and SearchSecurity.com 2013 Readers’ Choice Awards | 02 Oct 2013 | 1 Reply
- Unleashing IT – Business benefits go beyond improved protection | 01 Oct 2013 | 1 Reply
- Is Your Organization Clinging to Yesteryear’s Security Technologies? | 29 Jul 2013 | 1 Reply

Symantec Connect BlogRSS
Stay up-to-date with the latest developments on the Symantec Connect website. The team of moderators and administrators post here regularly about upcoming features, tips, and anything else that relates to the Connect website.
- Connect Dev Notes: 09 July 2014 | 09 Jul 2014 | 1 Reply
- Connect Dev Notes: 25 June 2014 | 25 Jun 2014 | 3 Replies
- Connect Dev Notes: 12 June 2014 | 12 Jun 2014
- Connect Dev Notes: 28 May 2014 | 28 May 2014
- Changes to the points structure on Symantec Connect | 23 May 2014 | 51 Replies
- Connect Dev Notes: 14 May 2014 | 14 May 2014
- Connect Dev Notes: 30 April 2014 | 30 Apr 2014
- Connect Dev Notes: 04 April 2014 | 02 Apr 2014
- Connect Dev Notes: 21 March 2014 | 21 Mar 2014
- Connect Dev Notes: 05 March 2014 | 05 Mar 2014 | 15 Replies

Mail and Web Security BlogRSS
Updates, news and views from the teams that bring you Email Security.cloud, Messaging Gateway, Web Security.cloud and Web Gateway.
- New Data Protection for Email Security.cloud is here | 08 Aug 2014
- Enhancements to Policy Based Encryption | 04 Aug 2014 | 1 Reply
- Introducing new access control features in Symantec Email & Web Security.cloud | 02 May 2014
- Email Security at Symantec Vision Las Vegas 2014 | 29 Apr 2014
- HeartBleed - a further update from Symantec Email & Web Security | 15 Apr 2014
- HeartBleed, OpenSSL and Symantec Email & Web Security | 10 Apr 2014 | 2 Replies
- Introducing DMARC Validation in Email Security.cloud | 27 Mar 2014
- Disarm Advanced Persistent Threats with Symantec Messaging Gateway | 19 Nov 2013 | 2 Replies
- Symantec Receives Eight Honors from Information Security Magazine and SearchSecurity.com 2013 Readers’ Choice Awards | 02 Oct 2013
- Have mergers, acquisitions and changes in vendors’ strategies benefited cloud email and web security customers? | 27 May 2013 | 1 Reply

Symantec IntelligenceRSS
The Symantec Intelligence Blog published by Symantec.cloud serves as a conduit for communicating Intelligence data, trends and statistics based on analysis of cyber security threats, trends and insights from the Symantec Intelligence team comprised of many world-renowned malware and spam experts. Sitting on the front lines of defense, they have a global view of threats across multiple communication protocols drawn from the billions of web pages, email and IM messages they monitor each day.- Symantec Intelligence Report: August 2014 | 10 Sep 2014
- Symantec Intelligence Report: July 2014 | 14 Aug 2014
- Symantec Intelligence Report: June 2014 | 11 Jul 2014
- Symantec Intelligence Report: May 2014 | 17 Jun 2014
- Symantec Intelligence Report: January 2014 | 20 Feb 2014
- Symantec Intelligence Report: December 2013 | 16 Jan 2014
- Symantec Intelligence Report: November 2013 | 17 Dec 2013
- Symantec Intelligence Report: October 2013 | 14 Nov 2013
- Symantec Intelligence Report: August 2013 | 18 Sep 2013
- Internet Security Threat Report Readership Survey | 25 Jul 2013
Cyber Security GroupRSS
Symantec’s Cyber Security Group provides security threat intelligence and managed services to help customers predict, prepare, and respond to attacks by modern adversaries.
- Prefetch Analysis in Live Response | 11 Sep 2014 | 6 Replies
- Turning an Incident Response Plan into a Program | 05 Aug 2014 | 1 Reply
- Early Incident Detection using a Layer 8 Sensor Array | 04 Aug 2014 | 4 Replies
- Enhancing Apache Logging For Improved Forensic Capability Part II: Implementing Enhanced Apache Logging | 04 Aug 2014
- Live Response vs. Traditional Forensics | 04 Aug 2014 | 6 Replies
- Performing Incident Response using Yara | 04 Aug 2014 | 7 Replies
- Are You Headed Toward an Incident Nightmare?!?! | 04 Aug 2014
- Malware Evolution; an Incident Response Perspective | 04 Aug 2014
- Enhancing Apache Logging For Improved Forensic Capability Part I: Examining Default Apache Logging | 04 Aug 2014
- When Time = Money: A Lost Opportunity Cost Formula For Security Incident Response, Part 2 | 04 Aug 2014

Security Response BlogRSS
Our security research centers around the world provide unparalleled analysis of and protection from malware, security risks, vulnerabilities, and spam.
- How to secure your new iPhone in three simple steps | 19 Sep 2014 13:57:35 GMT
- Life on Mars: How attackers took advantage of hope for alien existance in new Darkmoon campaign | 19 Sep 2014 11:37:02 GMT
- Snifula banking Trojan battles local Japanese security product | 17 Sep 2014 10:34:22 GMT
- New iPhone could herald change to payments security landscape | 11 Sep 2014 17:07:13 GMT
- Microsoft Patch Tuesday – September 2014 | 09 Sep 2014 20:53:11 GMT
- Significant security challenge for new vehicle communication standard | 08 Sep 2014 12:57:37 GMT
- Apple IDs targeted by Kelihos botnet phishing campaign | 05 Sep 2014 16:46:11 GMT
- Fresh phish served with a helping of AES | 04 Sep 2014 16:03:29 GMT
- Watch out for scams surrounding news of stolen celebrity nude photos | 01 Sep 2014 20:41:48 GMT
- Phishers use glamour model images as bait, steal Facebook user logins | 26 Aug 2014 08:40:29 GMT

The Confident SMBRSS
- Symantec Endpoint Protection Management Plug-in 2.5 for Kaseya | 27 Jun 2014
- Keep Your Business Safe From Zero-Day Attacks | 03 Jun 2014
- Symantec Expands Small Business Product Portfolio with Norton Small Business | 19 May 2014 | 1 Reply
- How will the end of Windows XP impact your small business? | 05 Mar 2014
- 2014 Small Business Security Trends | 15 Jan 2014
- Why You Need a “Pick One” Approach to Reigning in Rogue Clouds | 12 Jun 2013 | 1 Reply
- E-Commerce sales to top $1.29 trillion: Is your small business website protected? | 04 Jun 2013
- AAA rated by Dennis Technology Labs for small business anti-virus protection | 31 May 2013 | 1 Reply
- Social Media: Are You Letting the Bad Guys into Your Vault? | 28 May 2013 | 1 Reply
- Surviving the First Year: It’s Risky Business Being a Startup | 24 May 2013 | 1 Reply

Security Community BlogRSS
The Security Community Blog is the perfect place to share short, timely insights including product tips, news and other information relevant to the Security community. Any authenticated Connect member can contribute to this blog.- Symantec has released new version of Symantec Endpoint Protection. | 19 Sep 2014
- SONAR.SuspLaunch False Positive with Sept 15th SONAR Release | 16 Sep 2014
- Internet Explorer Security | 10 Sep 2014
- Are You Maximizing Your Security Investment in Endpoint Protection? | 09 Sep 2014
- Delivering Agile Security For Enterprise Clouds with SDDC and Micro-Segmentation | 09 Sep 2014
- SHA1 certificate shown as insecure or with mix content warning on Google Chrome 39 | 08 Sep 2014
- Protect Your POS Environment Against Retail Data Breaches | 04 Sep 2014 | 1 Reply
- Responding to Data Breaches in the Healthcare Industry | 27 Aug 2014
- Symantec Endpoint Protection release details | 27 Aug 2014 | 5 Replies
- Epidigitalogy: Digital Disease Control (Part VI) | 25 Aug 2014