Symantec Enterprise Blogs

Threat Hunter TeamSymantec
FeaturedPosted: 8 Min Read

Multi-Factor Authentication: Headache for Cyber Actors Inspires New Attack Techniques

Two-factor or multi-factor authentication is used to secure organizations and accounts from attackers, making it a problem for malicious actors. Recent attacks show how they are attempting to bypass or avoid it completely.

Multi-Factor Authentication: Headache for Cyber Actors Inspires New Attack Techniques
Stephen HeartyProduct Marketing Manager at Symantec, a division of Broadcom
FeaturedPosted: 3 Min Read

The Barbarians Are Inside the Gate: Least Privilege and Zero Trust

Once a rogue insider or hacker penetrates your access defenses, everything in the enterprise is at risk. The second tenet of Zero Trust, least privilege, is the only real-world solution.

Video
The Barbarians Are Inside the Gate: Least Privilege and Zero Trust
Threat Hunter TeamSymantec
FeaturedPosted: 3 Min Read

SolarWinds: How Sunburst Sends Data Back to the Attackers

In the fourth of a series of follow-up analysis on the SolarWinds attacks, we detail how data is sent to the attackers.

SolarWinds: How Sunburst Sends Data Back to the Attackers