David Bull

David Bull – McAfee Director, Enterprise Solution Marketing
David oversees the messaging, positioning, packaging and pricing of McAfee’s Data Loss Prevention, Cloud Access Security Broker, Encryption, Web, and Email protection technologies, including both SaaS and on-premises form factors. With over 17 years of experience in both enterprise and SMB focused software, David joined McAfee through the acquisition of Secure Computing in 2008, where he held product management and product marketing positions driving the Unified Threat Management (UTM) product line. Prior to McAfee, David spent seven years in the enterprise content management space at Stellent (acquired by Oracle in 2006), serving in the sales, product marketing, and product management groups. David lives in the Denver, CO area and holds a B.S. in engineering from Iowa State University and an MBA from Colorado Christian University.

Subscribe to David Bull Blogs

More from David Bull


Data Exfiltration, Part 7: Stop Breaches Before They Happen with Data Protection

Now, we’ve arrived at the moment you’ve all been waiting for—the seventh and final blog post in our series. You’ve already absorbed a great deal many facts, figures, and truths about the who, what, where, why, and how of data exfiltration. Are you ready for the big reveal? In this ...


Data Exfiltration, Part 5: What Tactics Are Thieves Using?

As you found out from our previous blog, a great deal of data goes out the door through both physical and electronic means. In this blog, we’ll address some of the more sophisticated electronic data exfiltration techniques used by cyberthieves. Many of these bad actors are really smart, innovative people ...


Data Exfiltration, Part 4: How Does the Data Leave Your Four Walls?

We hope that you’re stoked about expanding your knowledge about data exfiltration. In blog 4, we’re serving up another meaty topic—we’ll be looking at how exactly data walks out the door. Cybercriminals are exploiting the rapidly growing cloud computing trend. Thieves will go where the valuables are, so the cloud ...


Data Exfiltration, Part 3: What Do Data Thieves Want?

Welcome to part 3 of our discussion on data exfiltration. Sit down and make yourself comfortable as we get inside the mind of data thieves and explore the types and formats of data that interest them most. Just in case there’s any doubt in your mind, our primary research findings, ...


Data Exfiltration, Part 2: Who’s After Your Data?

Welcome to the second episode of our data exfiltration blog series. We’ll be taking a close look at the innocent and not-so-innocent actors who compromise your valuable corporate assets (no, we’re not talking about the Hollywood variety!). We’ll take a look at both external actors and internal actors and show ...


Data Exfiltration: The Who, What, Why, Where, and How

Call it what you will—data loss, data leakage, or data breach—theft of valuable corporate information assets has indisputably become a pervasive global problem. Many security professionals in every sector have had the misfortune of experiencing at least one data breach. According to a recent McAfee study, the security pros we ...


Handling Office 365 Email Hiccups: Take Control to Ensure Email Continuity

Email is one of those things that most of us can’t live without—and when it goes down, regardless of whether it’s hosted in-house or in the cloud, it can seriously halt business continuity and productivity and can even affect revenues. A case in point is this summer’s global Microsoft Office ...

Data Security

The Past, Present, and Future of Phishing and Malware

In the Digital Age, email is second nature. It’s a commonly accepted method of communication, and a convenient one, at that. With convenience, however, comes danger – especially if you’re not even alerted to the bait! This email ‘bait’ I’m referring to comes in the form of phishing scams, which ...


Battle of the Cloud Gateways – How does McAfee Web Protection Stack Up?

As the flood of threats spreading online today grows, the risk of getting infected by a virus increases as well, without the appropriate security solutions. Just a few years ago, new viruses cropped up every few days. Now, there are 387 new web threats per minute, meaning that you are ...


Taking Control Of Your Data In The Cloud

Who has access to my online data? What measures are being taken to protect it? What can I do to make sure it doesn’t end up in the wrong hands? The concerns behind these questions are rooted in our desire to maintain control over that which is valuable – a natural instinct. ...

Subscribe to McAfee Securing Tomorrow Blogs