Cindy has over 10 years of experience in the cyber-security industry. As a data protection specialist, Cindy is passionate about educating the field and sharing best practices on creating a better data security culture. Cindy has conducted primary research projects on data exfiltration, and spearheaded thought leadership programs via webinars, videos, and industry roundtable discussions. Prior to McAfee, Cindy has held various positions in the high-tech industry. Cindy holds a Master of Business Administration degree in Marketing from Santa Clara University, with a Bachelor of Science degree in Computer Engineering from University of Wisconsin - Madison. In her spare time Cindy enjoys cooking, creating recipes, and traveling.

Cindy Chen Blog Feed

More from Cindy Chen

Data Security

The Top 3 Reasons to Integrate DLP with a Cloud Access Security Broker

Companies of all sizes are adopting cloud-based services, such as Microsoft Office 365, as a way to give their end-users greater flexibility and easier access to core business applications.  This requires corporate IT departments to reexamine their current data security posture, including Data Loss Prevention policies to better monitor and ...

McAfee Partners

DNS – the Blind Spot in Your Security Ecosystem

It’s 10 a.m. on a Tuesday morning, and the company’s IT hero sits at her desk… “Firewall… check, anti-virus… check, network security… running, email systems…secured.”  But she has no idea whether the domain name system (DNS) servers are being used as back doors for cyber criminals sending her employees to ...


McAfee DLP Named a Leader in Gartner Magic Quadrant!

For the seventh year in a row, McAfee’s Data Loss Prevention (DLP) was placed in the Leader Quadrant of Gartner’s Enterprise Data Loss Prevention Magic Quadrant report. Published in late January, this report evaluates DLP vendors on both the ability to execute and completeness of vision. According to Gartner1, “Enterprise DLP ...


Containing Insider Threats With Monitoring and Coaching

Do you know that insiders, whether through accident or intent, account for more than 40% of data exfiltration? These incidents often happen when Office documents are copied to a removable drive, USB storage, or cloud file sharing application. One way to significantly reduce these incidents is through the use of ...


Securosis White Paper: Implementing and Managing a DLP Solution

Chapter 4: “Managing Your Data Loss Prevention Solution” Congratulations on a successful DLP deployment and configuration! If your policies and priorities are well defined, then management won’t pose any difficulties for you and your team. Developing and following efficient day-to-day processes is described in the fourth and final chapter of ...


Securosis White Paper: Implementing and Managing a Data Loss Prevention Solution

Chapter 1: Preparing to Deploy Data Loss Prevention”  Deploying a data loss prevention (DLP) solution can be intimidating, but take heart—it’s not as daunting as you might think if you approach it step by step. In his four-chapter white paper, Implementing and Managing a Data Loss Prevention Solution, Rich Mogull, analyst ...


Going Cloud: Are You Protected?

Box, Dropbox, SkyDrive, Google Drive, Syncpliclity… you name it. The cloud is transforming business, and cloud services are expanding into both personal and enterprise environments.  There are many benefits associated with cloud storage – large file storage capacity, easy access from any device, allows instant sharing of the data to ...


Data Protection for Mac OS is Here!

I’m pretty psyched to see McAfee releasing its latest Device Control version that supports Mac OS X Lion, OS X Mountain Lion, and OS X Mavericks.  This makes McAfee one of the first enterprise DLP vendors to offer removable media data protection on Mac OS X. The software is a ...


Intelligent DLP with End-user Classification

One of the biggest challenges for Data Protection solution is identifying sensitive data.  Today, organizations generate various types of sensitive data, ranging from regulated data such as PCI to unstructured data such as product designs.  Not all sensitive data can be identified and protected via regular expressions and keywords. By ...

Subscribe to McAfee Securing Tomorrow Blogs