All the latest blog posts from the most relevant cyber security companies in the business.

The adoption of the public cloud is driving a fundamental change in the way organizations connect remote users and distributed sites to their networks and applications. But as we’ve seen during other great times of change, tech transitions are tricky and always raise new security concerns. These are the security concerns of the Cloud Generation….

Experience is a valuable teacher, especially when you’re able to learn lessons from others who have taken similar journeys. That’s why we recently polled some of our most successful mobile security customers. They had valuable stories to share about the process they underwent evaluating and implementing mobile security solutions. We wanted to know the backstory:…

Another year, another increase in the number of mobile threats, vulnerabilities, and outdated mobile devices. So, what gives? If the headlines have you thinking that mobile security is getting worse, you’re not imagining things. We have just published the quarterly Mobile Threat Intelligence Report to dig into the 2017 numbers a bit.  The report is based on…

The threat landscape is getting more dangerous because it’s increasingly easy for malware authors to assemble elements (just in time) and deliver malicious payloads, and the likelihood they’ll get caught is very low.  Moreover, there’s far too much misleading information about cyber threats out there — for example, even though zero day threats receive plenty…

This month, in honor of Women’s History Month, we spotlight Symantec Cyber Career Connection (Symantec C3) alumna Layla Gardner. Symantec C3 partner NPower recently launched their campaign “The Future of Tech Has a Name” to launch 15,000 digital careers by 2022.  Today we are excited to feature the second part of our three-part series, “The Future of Cybersecurity Has a Name”,…

Throughout my career, I have seen first-hand the real world impacts that a breach in cyber security can have on customers, businesses and communities. With cyber attacks growing in number and sophistication, today security is a requirement of “doing business”, however, many companies and organizations lack the knowledge and resources to secure their platforms, products…

The introduction of a new generation of connected, intelligent devices into the workplace has helped businesses become more productive, serve customers more efficiently and expand into new markets. But as more smart devices join the burgeoning Internet of Things (IoT), the transition has scrambled the historical notion of the corporate endpoint. We’ve moved beyond the…

We have encountered a new and highly prevalent type of Android malware (detected as Android.Sockbot) posing as apps on Google Play and later adding compromised devices into a botnet. So far we have identified at least eight such apps, with an install base ranging from 600,000 to 2.6 million devices. This malware appears primarily targeting…