View All Publications

Securosis: Applied Threat Intelligence
One of the most compelling uses for threat intelligence is helping to detect attacks earlier. Examining for attack patterns identified via threat intelligence in your security monitoring and analytics processes shortens the window between compromise and detection. This Securosis white paper focuses on how to use threat intelligence to improve your ability to detect, prevent, and investigate attacks.

McAfee Next Generation Firewall — Securing global healthcare networks
Learn how McAfee Next Generation Firewall secures global healthcare networks with the highest level of network defense while enabling greater efficiency and cost savings.

McAfee Next Generation Firewall — Securing global retail networks
Discover how McAfee Next Generation Firewall provides a high level of network protection for global retail environments across multiple geographic locations.

Protecting Mobile Devices from Malware Attack — An Osterman Research White Paper
How can you protect your employees’ computers against malware attack regardless of their location? How can you enforce acceptable usage policies for employees located remotely or mobile? The best way to protect against web threats is to redirect all web traffic through a proxy or web gateway that can block blacklisted or unsuitable sites, filter malware downloads, and enforce rules preventing sensitive data from being lost. In this white paper, Osterman Research describes the four ways to reroute web traffic from a mobile device or remote computer through a gateway, and highlights the strengths and weaknesses of each approach.

SANS Data Center Server Security Survey 2014
Learn how organizations are tackling the difficult problem of data center security, as well as the best practices for meeting data center compliance demands while reducing overall risk and management complexity.

Secure Coding for Android Applications
More than one billion Android devices have been activated to date, and it’s estimate that 1.4 million devices are activated per day. The rapidly increasing popularity of this mobile OS demands that developers understand how to create secure Android applications. This white paper focuses on secure coding practices for Android applications.
Topics: Foundstone

Advanced Threat Defense for SIEM
When advanced detection solutions, known as sandboxes, collaborate with SIEM solutions, enterprises can better understand and respond to unknown, advanced attacks. McAfee Advanced Threat Defense and McAfee Enterprise Security Manager work in concert to extract relevant data from advanced malware and dramatically reduce time to response by minimizing uncertainty and accelerating remediation.

Gartner Digital Newsletter: Best Practices Against Advanced Threats
The newsletter includes access to Gartner research ‘Five Styles of Advanced Threat Defense’ and discusses how Intel Security solutions help organizations with every aspect of their advanced threat defense strategy and has uniquely integrated them to provide a powerful security platform.

Executive Summary — The Healthcare Internet of Things: Rewards and Risks
Read the executive summary of this report, which makes the case that industry must build security into healthcare devices and networks from the outset rather than as an afterthought.

Podsumowanie raportu — Służba zdrowia a Internet przedmiotów: korzyści i zagrożenia (Poland)
Niniejszy raport mówi o tym, dlaczego systemy zabezpieczeń w przemyśle powinny stanowić priorytet, nie zaś być jedynie nieistotnym dodatkiem.

Rapor Özeti — Sağlık Sektöründe Nesnelerin Internet'i: Ödüller ve Riskler (Turkey)
Bu raporda, sektördeki cihazlara yönelik güvenliğin neden sonradan değil de başlangıçta eklenmesi gerektiği açıklanmıştır.

The Healthcare Internet of Things: Rewards and Risks
This report makes the case that industry must build security into healthcare devices and networks from the outset rather than as an afterthought.

PCI Guidance: Microsoft Windows Logging
This paper discusses what is involved in establishing logging for Microsoft Windows systems, and discusses how those settings will also be useful in detecting system anomalies that could be indicative of system misuse or even a system breach.
Topics: Foundstone

Management of Native Encryption
With the rapid increase of PCs, tablets, and other devices in the enterprise environment, it’s critical to ensure that sensitive data is secure, and one of the best ways to achieve it is with encryption. Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.

Securosis: Leveraging Threat Intelligence In Incident Response/Management
To contain an advanced attack you need to respond faster and smarter. Focusing on shortening the window between attack and detection, coupled with a solid plan to contain and remediate an attack provides the best chance to overcome the attack. This is one of the key pieces of knowledge for security experts.
Topics: SIEM

McAfee Labs Threats Report: February 2015
McAfee Labs’ quarterly analysis of key threat topics and trends.
Topics: McAfee Labs

Protecting Against Mobile App SSL Vulnerabilities
Many mobile apps are vulnerable to man-in-the-middle attacks. Learn how to protect against them.
Topics: McAfee Labs

Defeating the Angler Exploit Kit
The Angler exploit kit has become one of the most popular and powerful attack kits. Learn how to protect against it.
Topics: McAfee Labs

Protecting Against Potentially Unwanted Programs
PUPs are applications that have legitimate uses but have functions and behaviors that can be exploited against the user without the user’s consent. Learn about PUPs and how to contain them.
Topics: McAfee Labs

Hacking the Human Operating System
This in-depth report examines social engineering as an attack vector. It details the psychological levers employed by social engineers to influence victims, communication channels used for attacks, and controls businesses should establish to reduce risk.
Topics: McAfee Labs