Raj Samani is Chief Scientist and McAfee Fellow for cybersecurity firm McAfee. He has assisted multiple law enforcement agencies in cybercrime cases, and is a special advisor to the European Cybercrime Centre in The Hague. Samani has been recognized for his contribution to the computer security industry through numerous awards, including the Infosecurity Europe hall of Fame, Peter Szor award, and Intel Achievement Award, among others. He is the coauthor of the book "Applied Cyber Security and the Smart Grid" and the "CSA Guide to Cloud Computing," as well as technical editor for numerous other publications.

Raj Samani Blog Feed

More from Raj Samani

McAfee Labs

The Morning After: What Happens to Data Post-Breach?

This post first appeared on the security website Dark Reading. We need consumers and businesses to not simply shrug off data breaches but to take active measures to protect their data. We are hopeful that new insights will provide a compelling answer to the question “So what?” No company is ...

Executive Perspectives

Is Cloud Security An Exaggerated Concern?

Research indicates the challenge has never been about security, but about transparency. The results are in: We have made zero progress since 2010. This was the year that IDC published results of a survey regarding cloud computing, and it found that security was the biggest barrier toward adoption. This statistic ...

McAfee Labs

A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress

More than 100,000 people descended upon Mobile World Congress (MWC) last week to watch experts from around the world discuss and share their views of what the future has in store for “mobile.” After four days at the event, what became obvious to me is that we have certainly progressed ...

McAfee Labs

Does Anyone Really Care About Mobile Security?

I’ve attended Mobile World Congress a number of times and it is fair to say the concept of the show has evolved over the years. Previously, when someone said “mobile” we thought of physical handsets; whereas the term today has a much more complex definition. “Mobile” now is a reflection ...

McAfee Labs

A Case of Mistaken Identity? The Role of BlackEnergy in Ukrainian Power Grid Disruption

Recent reports of electricity outages across the Ukraine has led to significant speculation regarding the specific malware that was used to disrupt supplies. McAfee’s approach in understanding this event included making contact with the impacted organization to offer our support and, where possible, retrieving data in order to analyze the ...

McAfee Labs

Updated BlackEnergy Trojan Grows More Powerful

In late December, a cyberattack caused a power outage in the Ukraine, plunging hundreds of thousands of citizens into darkness for hours. Threat researchers soon confirmed that the BlackEnergy malware package, first developed in 2007, was the culprit. They also discovered that the malware has been significantly upgraded since its ...

McAfee Labs

Blockchain Transactions Create Risks for Financial Services

This post was written by Raj Samani and Christiaan Beek of McAfee , and Shane D. Shook, PhD. Trust is the most valuable commodity in the digital age. Failure to trust the systems or organizations in which we place our digital assets leads us to look at alternate providers, or ...

McAfee Labs

A Dummies Guide to ‘Insider Trading’ via Botnet, Part 2

This post, the second of two parts, was written by Christiaan Beek, Raj Samani, and Shane Shook.  In our first post, we examined the evolution of the botnet. In this follow-up we will discuss a new botnet operating model that allows an attacker to get an insider’s view of infected organizations without ...

McAfee Labs

A Dummies Guide to ‘Insider Trading’ via Botnet

This post, the first of two parts, was written by Raj Samani, Christiaan Beek, and Shane Shook.  Want to spread malware? One of the most effective ways is to use a botnet, a network of infected systems. The goals of botnets have barely changed since we first encountered them more ...

Enterprise Executive Perspectives

What Is Your Customer Data Worth?

How to make sense of the market for stolen information. Personal data about you, me, and, most importantly, your customers is being openly sold via online marketplaces. Stolen data has become a mature commodity market, not unlike oil or metals, with supply-driven price fluctuations, different qualities of product, and a ...

Subscribe to McAfee Securing Tomorrow Blogs