Blogs

Vishal Kamble Sr. SQA Engineer
Featured Posted: 5 Min Read

Attackers Abuse WMIC to Download Malicious Files

Malware authors use WMIC and a host of other legitimate tools to deliver information-stealing malware, highlighting the continued use of living off the land tactics.

Attackers Abuse WMIC to Download Malicious Files
Karl Vogel Worldwide Solutions Architect, Symantec
Featured Posted: 5 Min Read

Threat Hunting – Be Proactive to Be Protected

Don’t wait for attackers to take the initiative. Here’s how proactive threat hunting can significantly improve your security posture

Threat Hunting – Be Proactive to Be Protected
Jaime Barclay Sr Mgr Corporate Responsibility
Featured Posted: 4 Min Read

Building Bay Area Cyber Security Talent

Through a New Grant from Symantec, NPower Expands Offerings in the Bay Area

Video
Building Bay Area Cyber Security Talent
Ty Shay SVP, Chief Marketing Officer
Featured Posted: 2 Min Read

On Leadership: Is Your Goal to be Invaluable - or Unnecessary?

I’d argue that striving to make yourself invaluable does your company a huge disservice. I’d aim for making yourself unnecessary.

On Leadership: Is Your Goal to be Invaluable - or Unnecessary?