Cloud Security

Learn about cloud threats, the latest cloud security technologies, and the leading approaches for protecting data in cloud services.

Cloud Security

McAfee and Atlassian Collaborate to Deliver Cloud Security Capabilities

Today cloud adoption is considered mainstream, with 83% of enterprise workloads expected to in the cloud by 2020 . As more organizations move their workloads to the cloud and to remote work from home environments, security must also evolve to meet the challenges of this new normal. According to a ...

Cloud Security

McAfee MVISION Cloud for Atlassian Access

Atlassian cloud products help small, medium, and big enterprises around the world to build and run their businesses effortlessly by enabling collaboration among team members both co-located and working remotely. Be it Jira for project planning and issue tracking, Confluence for document collaboration, Bitbucket for source code repository management, Opsgenie for incident management, or Jira Service Desk for customer support, all the products from Atlassian suite allow cross functional ...

Cloud Security

Shift Left Inline – Integration with Atlassian Bitbucket CI/CD Pipes

Infrastructure-as-a-Service (IaaS) is used by organizations of all sizes as the new default IT environment to build and host internal and customer-facing applications. To leverage numerous capabilities offered by IaaS providers for faster adoption, many organizations overlook the cloud shared-responsibility model and assume that security is taken care of completely ...

Cloud Security

Near Real-Time DLP and Malware support for IaaS

Cloud and IaaS (Infrastructure as a Service) represents the future of IT, as organizations across industries, consolidate their data centers. According to a press release from Gartner, “The worldwide public cloud services market is forecast to grow 17% in 2020 to total $266.4 billion, up from $227.8 billion in 2019, ...

Cloud Security

CVE Vulnerability Scanning for Containers

At McAfee, our job is to help secure the workloads and data that our customers rely on to power their business.  This release of MVISION Cloud for Containers is about taking all the best practices around how these systems should be designed and giving customers a strong security foundation even ...

Cloud Security

How an Attacker Could Use Instance Metadata to Breach Your App in AWS 

Moving to a cloud-native architecture for your enterprise applications can deliver tremendous business value, adding scale and agility while off-loading onerous tasks like patching and upgrading server infrastructure.   However, in every cloud environment, whether AWS, Azure, GCP or others, there is a new category of risk. Cloud-native threats stem from ...

Cloud Security

Choosing the Right Video Conferencing Service for you and your Enterprise

I have been asked, “Which is the best collaboration and videoconferencing service?” many times in the last few days as we need to communicate with our colleagues, business partners and customers when working remotely. Just like there’s no “best” car, there’s also no best collaboration service, but here’s a few ...

Cloud Security

Top 3 Data Visualization Capabilities in a CASB Solution

In the most recent Cloud Adoption and Risk Report generated by McAfee, 52% of the companies said they experience ‘better’ security in the cloud.  As enterprises move their most sensitive data assets to the cloud, they are making increased investments in CASB solutions to secure these data assets. Most security ...

Cloud Security

Cloud Security: Why You Need Device Control

With remote working, BYOD, employees using their own devices and shared access to collaborative cloud apps from business partners – we need to include device control when allowing access to our cloud services. Many cloud services have admin options to restrict access and functionality, sadly many of these features are ...

Cloud Security

Why do I need a CASB for Shadow IT when I already have a SIEM?

Why does my organization need to have a Shadow IT solution when we already own a Next-Gen Firewall / Web Proxy and have all the logs in a Security Information and Event Management (SIEM) solution? This is a question we are often asked by our customers. The answer is that ...

Subscribe to McAfee Securing Tomorrow Blogs