Home / Archives for Michael Leland

Michael Leland

Michael Leland brings more than 19 years of senior IT security leadership to McAfee. He formerly served as the CTO at NitroSecurity, responsible for developing and implementing NitroSecurity's overall technology vision and road-map including next generation network and security management solutions. Leland has held senior technical management positions at companies such as Eziaz, Cabletron and Avaya. At Avaya, a global telecommunications equipment and services vendor, he served as CTO where he led the company in its strategic efforts for converged data/voice development initiatives.
Leland received a B.S. in computer and electrical engineering from the Georgia Institute of Technology and an honorary MBA from Bentley, where he helped create the information age MBA curriculum.

Subscribe to Michael Leland Blogs

More from Michael Leland

Endpoint Security Security Operations

When You’re Overwhelmed With Alerts, It’s Time to Automate

In a number of recently publicized breaches, and probably many other attacks, information that could have enabled the security team to catch and contain the attack were lost in the sheer volume of alerts. Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential ...

Security Operations

Fastpass to SIEM ROI via Pre-built content for analysts and responders

In our previous Blog, we covered how customizing SIEM for threat management requires both resources and expertise.  As a result, McAfee created “ready to go” content packs based on Gartner’s Top Use cases.  targeting aspiring users to expand their SIEM detection and response use cases without spending countless hours and ...

Security Operations

Is Your SIEM ‘Ready To Go?’

The massive amount of log, event and flow data within the SIEM offers security analysts answers to essential security questions such as “who is accessing critical business systems,” or, more importantly, “was there any anomalous activity before, during or after the connection?” To get all these answers, though, users need ...

Subscribe to McAfee Securing Tomorrow Blogs