Senior Solution and Product Marketing Manager, Kathy Trahan has been in the cybersecurity industry for over 15 years working on network security, device security, threat intelligence, IOT security and cloud security with companies like Check Point Software, Cisco, Netapp, Trend Micro & Tripwire. She is responsible for content for McAfee’s management and collaboration story. She has provided guidance through blogs and social media on security & compliances such as NIST, PCI, GDPR, etc. She is responsible for content on McAfee's platform, endpoint and SOC story.

Kathy Trahan Blog Feed

More from Kathy Trahan

Security Operations

The Road to XDR

XDR (eXtended Detection and Response) is a cybersecurity acronym being used by most vendors today.  It is not a new strategy. It’s been around for a while but the journey for customers and vendors has been slow for many reasons. For McAfee, XDR has been integral to our vision, strategy ...

Security Operations

How OCA Empowers Your XDR Journey

eXtended Detection & Response (XDR) has become an industry buzzword promising to take detection and response to new heights and improving security operations effectiveness. Not only are customers and vendors behind this but industry groups like Open Cybersecurity Alliance (OCA) share this same goal and there are some open projects ...

Endpoint Security

Unravel the XDR Noise and Recognize a Proactive Approach

Cybersecurity professionals know this drill well all too well. Making sense of lots of information and noise to access what really matters. XDR (Extended Detection & Response) has been a technical acronym thrown around in the cybersecurity industry with many notations and promises. This can be intriguing and nagging for cybersecurity professionals who are heads down defending against the persistent adversaries. The intent of this blog is to clarify ...

Security Operations

Join the Cyber Security Dance

Automation and orchestration are central to the proverbial cyber security dance between IT operations and security operations center (SOC).  Both functions need to work with each other and establish a rhythm and alignment to keep their organization protected from cyber threats. The lure to automate is driven by the desire ...

Endpoint Security

Confused about Cybersecurity Platforms? We Can Help.

“Cybersecurity platform” continues to be an industry buzzword. Vendors talk about it at industry events, and many analysts. But can every vendor claim to offer a platform and also be credible? More importantly, how does that help your business? The security industry has evolved by responding to emerging threats with ...

Enterprise

Are You Sharing in this Cyberwarfare?

If your organization is, you can win on a couple fronts… In traditional warfare, information sharing is key. The notion of sharing insight on your opponent is extremely valuable and cannot be underestimated. The basic principles in Sun Tzu’s The Art of War state you must know yourself and know ...

Enterprise

Where is Your Security Management Journey Going?

Navigating security management is an ongoing process and sometimes erratic given the chaotic threat environment.  Maneuvering these often-uncharted cyber seas proves complicated and difficult. Is your cybersecurity vessel capable of sailing through tumultuous tides? Earlier this year we set out to obtain a snapshot of where organizations (McAfee & non-McAfee ...

Subscribe to McAfee Securing Tomorrow Blogs