Intel Security

View All Publications

Filter Content:

Verizon 2016 Data Breach Investigations Report

Intel Security contributed to Verizon’s 2016 Data Breach Investigations Report, which provides a comprehensive analysis of data breach patterns seen in 2015.
Topics: McAfee Labs

SIEM Kung Fu

Securosis looks at how to make the most of your current SIEM through advanced use cases and process improvements for optimization.

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

Think Like An Attacker

As attacks of all kinds rise, IT and security professionals are under the gun. But one way to stay ahead of the attackers is to think like one, and to bolster your organization’s security defenses accordingly.

How to Protect Against Ransomware

Learn how Intel Security products leverage a number of technologies that help prevent ransomware.
Topics: McAfee Labs

Understanding Ransomware and Strategies to Defeat it

In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. Learn how Intel Security products leverage a number of technologies that help prevent ransomware.
Topics: McAfee Labs

Network Security Hits a Speed Bump

The reality of 40 GbE and 100 GbE link speeds will soon be common in enterprise networks, with even higher capacities being planned. Learn how McAfee Network Security Platform and the XC-640 Load Balancing Appliance enable your IPS throughput to easily scale up to 320 Gbs.

Combatting Advanced Targeted Attacks: CORRECT

This guide describes ways to facilitate triage and prioritization for fluid investigation and rapid remediation. As you learn, your solution should apply insights immediately throughout a collaborative infrastructure.

Combatting Advanced Targeted Attacks: DETECT

This guide covers advanced monitoring to identify anomalous, outlier behavior to perceive low-threshold attacks that would otherwise go unnoticed. As you uncover evidence, your system should share findings to enrich decision-making throughout your security infrastructure.

Combatting Advanced Targeted Attacks: PROTECT

Intel Security recommends a three-pronged approach for disrupting advanced targeted attacks, starting with enhanced protection, described in this guide. The goal of this Protect stage is two-part: to stop the most pervasive attack vectors while disrupting never-before-seen techniques and payloads, and to derive insights that can strengthen countermeasures and inform investigators of unfolding activities.