Enterprise

Stay up to date on the latest cybersecurity trends, best practices, security vulnerabilities, and more.

Endpoint Security

5 Ways MVISION XDR Innovates with MITRE ATT&CK  

The MITRE ATT&CK® Framework proves that authority requires constant learning and the actionable information it contains has never held greater currency. Likewise, XDR, the category of extended detection and response applications, is quickly becoming accepted by enterprises and embraced by Gartner analysts, because they “improve security operations productivity and enhance detection and response capabilities.”   It is less ...

Endpoint Security Français

Clarifier le discours sur la technologie XDR et importance d’une approche proactive

Les professionnels de la cybersécurité sont passés maîtres dans l’art de dégager l’essentiel à partir d’une masse d’informations plus ou moins utiles et pertinentes. L’acronyme XDR (Extended Detection and Response) a été largement brandi dans le secteur de la cybersécurité, souvent évoqué et par ailleurs vanté comme une technologie prometteuse. ...

Endpoint Security German

Worauf es bei XDR wirklich ankommt und was es zu einem proaktiven Ansatz macht

Cyber-Sicherheitsexperten wissen nur allzu gut, was es heißt, einen Berg an Informationen sinnvoll zu interpretieren und die wirklich wichtigen Dinge herauszufiltern. XDR (Extended Detection & Response) ist ein in der Cyber-Sicherheitsbranche heute viel diskutiertes Thema, in das große Hoffnungen gesetzt wird. Für Cyber-Sicherheitsexperten, die mit der Abwehr hartnäckiger Angreifer beschäftigt ...

Security Operations

Why MITRE ATT&CK Matters?

MITRE ATT&CK enterprise is a “knowledge base of adversarial techniques”.   In a Security Operations Center (SOC) this resource is serving as a progressive framework for practitioners to make sense of the behaviors (techniques) leading to system intrusions on enterprise networks. This resource is centered at how SOC practitioners of all ...

Cloud Security

The Fastest Route to SASE

Shortcuts aren’t always the fastest or safest route from Point A to Point B. Providing faster “direct to cloud” access for your users to critical applications and cloud services can certainly improve productivity and reduce costs, but cutting corners on security can come with huge consequences. The Secure Access Service ...

Security Operations

Hacking Proprietary Protocols with Sharks and Pandas

The human race commonly fears what it doesn’t understand.  In a time of war, this fear is even greater if one side understands a weapon or technology that the other side does not.  There is a constant war which plagues cybersecurity; perhaps not only in cybersecurity, but in the world ...

Cloud Security

Domain Age as an Internet Filter Criteria

Use of “domain age” is a feature being promoted by various firewall and web security vendors as a method to protect users and systems from accessing malicious internet destinations. The concept is to use domain age as a generic traffic filtering parameter. The thought is that hosts associated with newly ...

Endpoint Security

Are You Ready for XDR?

What is your organization’s readiness for the emerging eXtended Detection Response (XDR) technology? McAfee just released the first iteration of this technology, MVISION XDR. As XDR capabilities become available, organizations need to think through how to embrace the new security operations technology destined to empower detection and response capabilities. XDR is a journey for people and ...

Endpoint Security

XDR – Please Explain?

SIEM, we need to talk!  Albert Einstein once said, “We cannot solve our problems with the same thinking we used when we created them”.  Security vendors have spent the last two decades providing more of the same orchestration, detection, and response capabilities, while promising different results. And as the old adage goes, doing the same thing ...

Security Operations

6 Best Practices for SecOps in the Wake of the Sunburst Threat Campaign

1. Attackers have a plan, with clear objectives and outcomes in mind. Do you have one? Clearly this was a motivated and patient adversary. They spent many months in the planning and execution of an attack that was not incredibly sophisticated in its tactics, but rather used multiple semi-novel attack ...

Subscribe to McAfee Securing Tomorrow Blogs