Sources: Symantec Is Looking To Break Into The SIEM Market – Page: 1

Symantec has recently evaluated potential acquisitions that would bring it back to the SIEM (security information and event management) market, according to CRN sources and published reports.

Symantec is said to have recently explored the prospect of buying RSA from Dell Technologies, according to sources close to RSA and Symantec. Multiple sources reached by CRN said it does not appear that talks are ongoing between the two companies.

However, Symantec didn’t stop shopping there. On Wednesday, Bloomberg reported that Symantec had held discussions with Splunk for a possible acquisition. Splunk has been making big investments around its security portfolio as it looks to provide a next-generation SIEM and analytics solution. Bloomberg reported that the talks were called off after Symantec started probing Splunk finances compared to its valuation, which currently sits around $9.4 billion.

[Related: Symantec President: We Aren’t Done Making Acquisitions Yet]

Symantec did not respond to CRN requests for comment. RSA said it doesn’t comment on rumors or speculation.

The talks come as Symantec looks to build out its vast cybersecurity platform. The company has already made multiple acquisitions in the past year, in areas such as cloud security, mobile security, threat prevention, identity protection, and more. The company does not have a SIEM offering; it exited that business in 2013 by discontinuing its Symantec Security Information Manager offering.

RSA and Splunk both stand out in the market as SIEM specialists and security market leaders.

RSA offers a broad portfolio of security solutions, including offerings in identity and access management with SecurID; SIEM and threat detection and response with NetWitness; governance, risk and compliance with Archer; and fraud prevention. Symantec overlaps in just one area – it, too, offers identity and access management and GRC solutions.

Splunk’s new approach to the SIEM market has garnered much attention as it streamlines security operations with machine learning, real-time data, analytics and security management. The company also offers anti-fraud, log management, ransomware and security investigation technologies.

Other standalone companies in the SIEM or security analytics space include LogRhythm, Exabeam, SumoLogic, and Cybereason. IBM, HPE and McAfee also offer SIEM solutions. 

In a recent interview with CRN, Symantec President and COO Michael Fey said the company is looking to make further acquisitions. He did not specify what areas Symantec would evaluate, saying only that it will focus on areas that “add value and metrics” to the portfolio.

My Facebook fan page status

Hiya, Sonik here with a new post. So later this year, I made a post saying there would be an update surrounding my Facebook Fan page and what will happen to it and my own account as well.

As you know, I have not been all that active on facebook and this kinda ties in with my Fan page being kinda inactive. Somewhat. But there is a reason.

The reason why I am shutting down my facebook fan page

I wanted to make a fan page cause I knew it would be a place to post content. However, making content that is worth a fan page is hard. Seeing as the “stuff” I make, I don’t see worth keeping a fan page up for.

Yeah, I blog a lot on WordPress and rant….A lot. I wouldn’t say that is worth having a fan page for. I color and shade in sketches but again, I don’t see a point for having a fan page for it. If I did for some reason, see what I do or did that was worth having a fan page in the first place. It would be a waste of time, as it is on a social site that I barely use.

I made my fan page cause I felt that the stuff I did prior was worth having a fan page and I thought I would be able to pump out a game in a week or a month or 2. But that was not the case. Game Development takes time and work to make a working game, it’s not something that can be done in a matter of weeks or a few days. Unless you are a game developer who has been doing this for years.

I got off track here. Point is, I jumped the gun with this Facebook Fan Page idea. And that is why I am closing it down and I have never been fond of Facebook, to begin with. Take that as you will.

I will not Deactivate my Facebook account if, by some chance, I’m needed on facebook for something. But I really won’t be needed for anything on facebook, so I’m good there.

Facebook is a nice, err, ok site to me. That is opinion. I know, pretty crazy.

So, what is going to happen? I am shutting down the facebook fan page. I may make a “Fan page” on Twitter in the near future. And maybe come back to make a fan page on Facebook, this will only be done once I master game stuff or make things that is worth having a fan page.

I want to say thank you to everyone who supported my inactive fan page. I never thought I would have people like my page, it has been an honor.

So in the future, I may make a twitter page for my stuff but, I will have to see what the future holds for me. But this was the update I wanted to make for the fan page. And I think I should be clear about “shutting down”.

The fan page is dead, it will no longer get any more updates, streams, anything to the fan page. It’s inactive. I will delete it tonight. At 1 AM, EST

But again, thank you to those who followed my fan page but it’s not fair for you to follow, an inactive fan page and it’s better this way.

Thanks for listening to me about this. 😛

Destiny 2 Adventures list – how complete Adventures around the galaxy • Page 1 •

Published 18/09/2017

Destiny 2 Adventures are a new addition to the universe, and a great way of giving players something to do between missions – or, of course, for grinding gear and levelling up when the story’s all done.

You’ll find Adventures on all of Destiny 2’s planets, with their tasks varying from search and destroy to search and… defend? And plenty of other jobs of course too.

Like we said, they’re great time-killers and alternatives for grinding, so with that said here’s our Destiny 2 Adventures list, with notes on how to unlock Adventures and specific walkthroughs on each page too, to help you get over any tricky bumps in the road along the way.

Destiny 2 Adventures explained

Adventures are Destiny 2’s answer to side-quests – short, simple, and optional, but worth the investment. The first one, A New Frontier, is compulsory, but after that they’re completely optional, but we’d strongly suggest you them on.

That’s because in addition to the XP you’ll earn through combat you’ll also be rewarded with loot or varying degrees of rarity to beef up your gear, Tokens to increase your reputation, and the narrative also helps to flesh out the various characters and give a bit more background to the story.


Destiny 2 Adventures list – how to unlock and complete every Adventure

Earth – European Dead Zone (EDZ):


Destiny 2 guide, story walkthrough
Class changes, Exotics, levelling and more explained.

Destiny 2 guide, story walkthrough

Want more on Destiny 2? Our Destiny 2 guide tells you everything else there is to know on the game so far, including Adventures, Lost Sectors, Strikes, Treasure Map locations, Heroic Public Events, and Flashpoints. Elsewhere we explain how to Power level to the 265, 300 and 350 Power caps, as well as what to spend Glimmer on, how to get a Sparrow in Destiny 2, how to join Clans and how Legendary Shards work, Crucible tips, a Destiny 2 Exotics list, details on the Nightfall schedule, Trials of the Nine and the weekly reset, how to unlock classes and subclasses, and how to complete the Destiny 2 Raid.



If you’re at the recommended Power level then each one should take about 15-20 minutes to complete so they’re useful if you’ve not got the time to invest in anything more substantial. Most of them take place in areas you’ll have visited during the story but one or two will take you off the beaten path and may lead to other discoveries on the way.

Throughout the course of the game more will unlock, and there are 30 in total to experience – 13 in the EDZ, 5 on Titan, 7 on Nessus, and 5 on Io. Once all Adventures in a Region have been completed you can go back and replay them whenever you like, so if you’re on the grind for some sweet sweet loot they
may make a nice change from Public Events.

Facebook Profile vs. Page – John Rector

Ali is the machine learning artificially intelligent software agent developed by thousands of software engineers working for Facebook, Inc. She is remarkable. She keeps up with over 2,000,000,000 customers that she calls registered users.

Her customers are humans NOT Pages. Pages are just something for the humans to do. She keeps a dossier on each customer. Each customer (human) has a PROFILE! Pages cannot exist without a Profile. A Profile must create and administer a Page.

When you decide to use Facebook on your phone, tablet or laptop, she quickly picks 1,500 “stories” from a pool of trillions. In less than 1 second she ranks those 1,500 stories from most likely to keep you using Facebook to least likely and “serves” them to you on your newsfeed. She uses her dossier on you to make these decisions. Her dossier on you is quite extensive, very accurate and up to date. 

She is measured by “Time Spent”. When she reports to her boss, she is asked 2 questions:

1. How many humans used you EVERY day this month? Her answer is called DAU – Daily Active Users.

2. How much time did each one of those humans spend on Facebook doing something that day? Her answer is an AVERAGE and sounds like this “Last month there were 1,360,000,000 daily active users that spent an average of 23 minutes each day using Facebook.

If your business PAGE publishes (aka “posts”) a newsletter like company announcement; that “story” goes into the pool of trillions. When any human starts an active session with Facebook, Ali picks 1,500 stories from that pool of trillions which may or may not include your post.

She provides you with a dashboard so you can understand how you’re doing. It is in her best interest to improve the overall quality of the pool of possibilities (aka published stories) in order to please her customers.

Screen Shot 2017-09-12 at 8.20.56 AM


That dashboard is called “Insights”. It tells you everything you need to know. If you don’t know how to read your dashboard, call me! I don’t want you driving in the Land of Oz blindly.

Destiny 2 Lost Sectors – locations and their repeatable loot rewards explained • Page 1 •

Published 10/09/2017

Destiny 2 Lost Sectors are something new to Bungie’s space-faring sequel – mini-dungeons that you can find as you explore each Patrol area, each with a manner of things to shoot and find.

There are a total of 27 spread across Earth, Nessus, Titan and Io and each one offers varying levels of challenge – including lots of enemies and a dungeon mini boss).

What are Lost Sectors in Destiny 2?

Lost Sectors are mini-dungeons tucked away off the beaten path in the game’s many Patrol areas. As you are exploring, you will find a symbol painted on a wall like this, indicating that one is nearby:


From there, the dungeon is close, you just have to find the entrance, which is where our series of links below come in.

Once you’re inside, you then have to clear the dungeon of its enemies, including a named boss. Doing so will allow you to open the Lost Sector chest at the end and take its loot.

The game’s first EDZ mission will give you a taste of this, taking you into the basement of the church where one of the Trostland Lost Sectors can be found.

Lost Sector locations

Below is an in-progress list of Lost Sectors and their locations.

The game doesn’t provide a Power level suggestion for completing each one, but if you are in that area for another objective, chances are you are powerful enough to take it on – there’s no need to unlock them otherwise.

However, some can be very difficult, so don’t worry about getting them out of the way from the beginning. Try tackling them in a squad or after you’ve finished the campaign and hit level 20; we found a Power Level of 200 and over made us strong enough for any of them.




More coming soon!

Destiny 2 guide, story walkthrough
Class changes, Exotics, levelling and more explained.

Destiny 2 guide, story walkthrough

Want more on Destiny 2? Our Destiny 2 guide tells you everything else know on the game so far, including every change big and small from the original. Elsewhere we explain how to get a Sparrow in Destiny 2, how Clans and Guided Games and Legendary Shards work, Crucible tips, a Destiny 2 Exotics list, details on the PC version and graphics options, how to unlock classes and subclasses, details of all Destiny 2 PS4 exclusives and everything we know about the upcoming Destiny 2 Raid.

Lost Sector rewards and repeatable loot

Lost Sectors typically contain several loot drops and a Token for that planet.

Though they are dungeons that can be cleared, they are repeatable (once a day) allowing you to get loot again.

However, it won’t be as much as the first time you completed it, and are more in-line with a loot chest you’d receive after an activity such as a Public Event – usually one Blue (rare) Engram with a Token for that planet’s Faction.


Lost Sector chests look a little different to regular ones.

Once you get so far in the story, you’ll unlock some additional systems and features, including Challenges.

These give you additional tasks to do in each mode, and in Patrol, once of these could include doing a Lost Sector within a specific area of planet, giving you further incentive to replay Lost Sectors you have already cleared.

Additional reporting by Matthew Reynolds

Symantec Warns Of Hackers Gaining ‘Operational Access’ To North American Power Grids – Page: 1

Symantec on Wednesday warned that a three-year hacking campaign that has targeted power plants in the U.S. and Europe appears to have intensified this year.

The security company said in a blog post that a hacking group called Dragonfly seems to be behind a recent series of attacks, which have both compromised energy companies and, in some case, led to hackers gaining operational access to power grids in the U.S.

“The Dragonfly group appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so,” Symantec said in a blog post.

[Related: Security Firms: CrashOverride Malware Marks Newest Security Threat For Industrial Control Systems]

According to the security firm, the hackers are using a variety of methods to gain access to energy plant networks – including sending malicious emails to plant employees and operators, as well as sending files disguised as Flash updates that are used to install malicious back doors onto target networks.The campaign has been targeting energy grid operators, oil pipeline operators and industrial equipment providers.

For instance, one malicious email campaign sent emails to employees of an unidentified energy sector company disguised as an invitation to a New Year’s Eve party. Once opened, a document attached to these emails would attempt to leak victims’ network credentials to a server outside of the organization.

Hackers have also used “watering hole” attacks to target the power grid, through compromising websites that are likely to be visited by employees in the energy sector.

Symantec and some other security groups first exposed Dragonfly’s campaign in 2014, and it has since died down – but in  2017 there has been “a distinct increase in activity,” said the company.

Cybersecurity concerns have increased in the industrial control segment, particularly since December 2016 when a cyberattack briefly shut down power in parts of Kiev, Ukraine, affecting hundreds of thousands of people. In June, security firms Dragos and ESET revealed a new malware framework, CrashOverride, which they alleged was behind the Ukraine attack and is capable of taking down grids for a few days.

Marc Harrison, president of Silicon East, a Marlboro, N.J.-based solution provider, said that organizations in the power sector need to heed to several security practices – including limiting access to trusted devices, implementing two or three factor authentication on devices, monitoring all industrial control systems for suspicious behavior, and removing all external access to critical systems.

“Power plants are no different than any other business when it comes to cyber-security – it’s just that the consequences are potentially so much more serious,” said Harrison. “All of the same security best practices apply and need to be implemented and continuously managed.”

Get on the same page: new Google Docs features power team collaboration

Getting people on the same page for a project can be tough. It requires managing a ton of opinions and suggestions. The last thing you should have to worry about is making sure your team is literally working on the same document. That’s why we built our powerful real-time editing tools to help with this—Google Docs, Sheets and Slides—so that teams can work together at the same time, using the most up-to-date version.

Today, we’re introducing new updates to better help with “version control,” to customize tools for your workflows, and to help teams locate information when they need it.

Track changes, make progress

It can take dozens of edits to make a document just right—especially a legal agreement, project proposal or research paper. These new updates in Docs let you more easily track your team’s changes. Now, your team can:

  1. Name versions of a Doc, Sheet or Slide. Being able to assign custom names to versions of your document is a great way to keep a historical record of your team’s progress. It’s also helpful for communicating when a document is actually final. You can organize and track your team’s changes in one place under “Version history” (formerly known as “Revision history”) on the web. Select File > Version history > Name current version. For even quicker recall, there’s an option to select “Only show named versions” in Docs, Sheets or Slides.

  2. Preview “clean versions” of Docs to see what your Doc looks like without comments or suggested edits. Select Tools > Review suggested edits > Preview accept all OR Preview reject all.

  3. Accept or reject all edit suggestions at once in your Doc so your team doesn’t have to review every single punctuation mark or formatting update. Select Tools > Review suggested edits > Accept all OR Reject all.

  4. Suggest changes in a Doc from an Android, iPhone or iPad device. Click the three dots menu in the bottom right of your Doc screen to suggest edits on-the-go. Turn on the “Suggest changes” toggle and start typing in “suggestion mode.”

Compare documents and review redlines instantly with Litera Change-Pro or Workshare Add-ons in Docs.


Here’s a quick way to preview and accept all changes (or reject them) and name versions of your document

Use new templates, add-on time-saving functionality

Teams use templates in Docs and Sheets to save time on formatting. At the same time, developers are building add-ons to customize functionality. We thought, why not bring these two together? That’s why today, we’re introducing new templates with built-in add-ons and the ability to create your own, so your templates not only look good—but they make sure the work gets done.

These templates allow you to customize and deploy tools specific to your organization’s workflows. We’ve launched five examples of this in the general template gallery, like the new Mutual Non-disclosure agreement (NDA) template from LegalZoom and DocuSign. With this template, businesses can quickly create an NDA and collect signatures using the DocuSign Add-on for Docs. Bonus: it also automatically detects the required signature fields on the template, which saves even more time when you request signatures. This is just one of a few new templates—we’ve also worked with Lucidchart, PandaDoc, EasyBib and Supermetrics to help you save time and maximize efficiency throughout your team’s workflows.

In addition, you can also create your very own template with built-in Add-on customized to your company’s workflows. For example, create a Sheets template paired with an add-on to gather internal approvals or an invoice template in Docs (paired with an add-on) that pulls information from your CRM system.


The new mutual NDA template from LegalZoom and DocuSign lets you collect NDA approvals stat.

Find the information you need, when you need it

Sometimes the hardest part of creating a proposal or client presentation is tracking down the information you need to include in it. Starting today for G Suite Business and Enterprise customers, Google Cloud Search will integrate with Docs and Slides via the Explore feature. Using Machine Intelligence, Cloud Search surfaces relevant information to help you work more efficiently throughout your day.

To get started, open the Explore tab in Docs or Slides and type what you’re looking for. Cloud Search will show you important details from your information across your G Suite apps including Gmail, Drive, Calendar, Sites and more, to help you create top-notch Docs and presentations.


Now you can use Google Cloud Search through the explore features in Docs and Slides.

Teams are using Docs to collaborate in creative ways. Check out this post for inspiration, or visit the Docs site to get started.

Security Platform Provider Verodin Brings In Former Symantec Exec As New Chief Revenue Officer – Page: 1

Verodin, a developer of technology for measuring the effectiveness of business security environments, on Tuesday said it has hired former Symantec executive Rob Potter as its first chief revenue officer.

The move from Symantec to Reston, Va.-based Verodin offered an opportunity to work with technology that adds value to existing security environments, including businesses working with his former employer, Potter (pictured) told CRN.

“This is innovative technology,” he said. “But we’re not playing in the same swim lanes as other vendors. Customers are really challenged to know how their security products align with their expectations. It’s important to look at what technologies can address their needs, and ensure there’s no drift in how the technology impacts their environments.”

[Related: Q&A: Symantec CEO On DigiCert Deal And Partner Growth With Platform Security]

Potter left Symantec in early July during that company’s leadership transition, and joined Verodin in late July, he said.

Verodin provides Potter a way to use his years of security experience at Symantec, and before that at RSA and EMC, to help customers who have already invested in security manage the technologies they’ve invested in.

“Our ability to measure the effectiveness of security solutions, to see if they are failing and how they are failing, all help determine how to improve the security environment,” he said. “We’re not a security company. We’re a business platform.”

The Verodin platform provides the instrumentation to determine the efficacy of customers’ security environment, and see how that environment is impacted by removing a security technology, or moving from an on-premises technology to the cloud, Potter said. “Our technology looks at how such changes might impact their security, and looks at new ways to enhance their security,” he said.

Verodin can integrate with and measure the efficacy of endpoint security, proxies, firewalls and more, Potter said.

“We have the ability to act as both the attacker and the defender inside the firewall to look at how the environment reacts to an attack, what alerts are sent, and how security people respond,” he said. “It’s not a traditional product to block or detect something. Instead, it looks at if products already in the environment protect and defend as they are expected to.”

“Everybody is looking for outcomes,” said Todd Weber, vice president of partner research and strategy at Optiv Security, a Denver-based security-focused solution provider and Verodin channel partner. “Buying technology for the sake of technology may be fun, but customers need outcomes. We take customers through the buying process by saying these products solve certain problem, but if you don’t have this problem, don’t buy it.”