NortonLifeLock Research Group

NortonLifeLock Research Group, known as Symantec Research Labs until 2019, was formed in June 2002 to secure the world's computing devices and information through novel security and privacy paradigms.

Our Mission

As NortonLifeLock's global research organization, NortonLifeLock Research Group (NRG) is focused on driving trust and safety in an online world by creating new paradigms to enable digital security and privacy. NRG (pronounced "energy") has played a leading role in exploring many cutting-edge technologies now commercialized across NortonLifeLock's many product areas. Such technologies from the group include targeted attack protection, reputation based security, industry-leading rootkit protection, cloud based security services, and some of the industry's earliest behavioral protection technologies. NRG is actively pursuing research with many partners in universities and beyond.

Blogs

Cyber Scammers Targeting Our Older Population

Like latter-day Willie Suttons, cyber criminals are targeting this specific age demographic “because that’s where the...

Posted: 08 Apr, 2020 | 4 Min Read

Read More

NortonLifeLock Privacy Watch

Volume 3

Posted: 27 Mar, 2020 | 4 Min Read

Read More

NortonLifeLock Privacy Watch

Volume 2

Posted: 05 Mar, 2020 | 4 Min Read

Read More

Machine Learning for Security: Things Will Work Better with Humans in the Loop

Why Machine Learning for Security Is Difficult

Posted: 28 Feb, 2020 | 5 Min Read

Read More

Featured

Digital Privacy and the Right to be Protected

With our digital privacy at risk in unprecedented ways, there’s new urgency to find ways to safeguard people's digital life.

NortonLifeLock Graduate Fellowship

NortonLifeLock is awarding Graduate Fellowships to outstanding Ph.D. students. A key goal of the program is to fund innovative research that has real-world value, in areas where NortonLifeLock conducts business. These areas include, but are not limited to: privacy, identity, human factors, machine learning, and security.

Blog Archive

The Tangle of Service Dependencies: Has the Internet Become Brittle?
Learn about potential Internet infrastructure hazards

What We’re Doing to Fight the Scourge of Cyber Stalking
Here’s how we’re battling “creepware” to protect victims of stalking and intimate partner violence

Cloud Security is Overwhelming. AI and Machine Learning Can Help
Learn how AI and machine learning can play a key role in enhancing the capabilities of your security staff

Why We Need a Security and Privacy “Nutrition Label” for IoT Devices
Things are getting worse as the growing number of home IoT devices increases their aggregate attack surface

Code Signing: Can you trust that executable?
If a file is digitally signed, and you trust the signer, then you can probably trust the executable. But what happens when something goes wrong?

Digital Privacy and the Right to be Protected
With our digital privacy at risk in unprecedented ways, there’s new urgency to find ways to safeguard people's digital life

Defending Data Requires More than Good Intentions
Symantec Research Labs used publicly available security scans to identify/expose private information