Enterprise

Stay up to date on the latest cybersecurity trends, best practices, security vulnerabilities, and more.

Cloud Security

Data-Centric Security for the Cloud, Zero Trust or Advanced Adaptive Trust?

Over the last few months, Zero Trust Architecture (ZTA) conversations have been top-of-mind across the DoD. We have been hearing the chatter during industry events all while sharing conflicting interpretations and using various definitions. In a sense, there is an uncertainty around how the security model can and should work. ...

Security Operations

The Deepfakes Lab: Detecting & Defending Against Deepfakes with Advanced AI

Detrimental lies are not new. Even misleading headlines and text can fool a reader.  However, the ability to alter reality has taken a leap forward with “deepfake” technology which allows for the creation of images and videos of real people saying and doing things they never said or did. Deep ...

Cloud Security

“Best of Breed” – CASB/DLP and Rights Management Come Together

Securing documents before cloud Before the cloud, organizations would collaborate and store documents on desktop/laptop computers, email and file servers. Private cloud use-cases such accessing and storing documents on intranet web servers and network attached storage (NAS) improved the end-user’s experience. The security model followed a layered approach, where keeping ...

Cloud Security

Top 10 Microsoft Teams Security Threats

2020 has seen cloud adoption accelerate with Microsoft Teams as one of the fastest growing collaboration apps, McAfee customers use of Teams increased by 300% between January and April 2020. When we looked into Teams use in more detail in June, we found these statistics, on average, in our customer ...

Cloud Security

MITRE ATT&CK for Cloud: Adoption and Value Study by UC Berkeley CLTC

Are you prepared to detect and defend against attacks that target your data in cloud services, or apps you’ve built that are hosted in the cloud?  Background  Nearly all enterprises and public sector customers we work with have enabled cloud use in their organization, with many seeing a 600%+ increase1 in use in the ...

Enterprise

McAfee Leapfrogs Competition with trio of awards at 2020 IT World Awards

Network Products Guide, the industry’s leading technology research and advisory guide, recently named the winners in their 15th Annual 2020 Network PG’s IT World Awards. Judges from a broad spectrum of industry voices around the world participated and their average scores determined the 2020 award winners.  McAfee took center stage ...

Cloud Security

MVISION Cloud for Microsoft Teams

McAfee MVISION Cloud for Microsoft Teams, now offers secure guest user collaboration features allowing the security admins to not only monitor sensitive content posted in the form of messages and files within Teams but also monitor guest users joining Teams to remove any unauthorized guests joining Teams.   Working from home has become a new reality ...

Endpoint Security

What A Threat Analyst Really Thinks of Intelligence

When I was a threat analyst, too long ago for me to actually put in writing, I remember the thrill of discovery at the apex of the boredom of investigation. We all know that meme:   And over the years, investigation leads became a little more substantial. It would begin ...

Endpoint Security

Why Ransomware Targets No Longer Need to Wind Up as Ransomware Victims

It was every administrator’s worst nightmare. A small district hospital in western Colorado lost access to 5 years’ worth of patient records after ransomware attackers exploited holes in an aging infrastructure to strike. But it was also an increasingly familiar story as ransomware attackers escalate their attacks and go after ...

Enterprise

Understand and Manage Pesky Persistent Threats

Ransomware Evolution to Most Promising Victim (MPV) Attacks Ransomware cost businesses over $11.5 B with a 500% increase in attacks in 2019 according to Forrester Research. It’s your persistent threat.   Ransomware is a type of malicious software that infects a computer and restricts users’ access to it and their data ...

Subscribe to McAfee Securing Tomorrow Blogs