Cloud Security

Learn about cloud threats, the latest cloud security technologies, and the leading approaches for protecting data in cloud services.

Cloud Security

The Shifting Risk Profile in Serverless Architecture

Technology is as diverse and advanced as ever, but as tech evolves, so must the way we secure it from potential threats. Serverless architecture, i.e. AWS Lambda, is no exception. As the rapid adoption of this technology has naturally grown, the way we approach securing it has to shift. To ...

Cloud Security McAfee Partners

Why Traditional Database Security Doesn’t Protect Data

If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers would vary widely. Each team views the definition based on their own requirements, but the one answer that most likely won’t appear is: “To protect data.” Traditionally, database security has ...

Cloud Security

5 Things Your Organization Needs to Know About Multi-Cloud

Cloud awareness and adoption continues to grow as more enterprises take advantage of the benefits that come with multiple cloud platforms. As this trend continues its upward trajectory, we see more tech vendors coming to market with new tools designed to address a variety of different challenges. Whether you are ...

Cloud Security

Moving to a Software-Defined Data Center and Its Impact on Security

For 57% of enterprise organizations in our latest survey on cloud adoption, IT infrastructure took the form of a hybrid cloud, i.e. a mix of public cloud infrastructure-as-a-service (IaaS) and some form of private cloud data center. At McAfee, we spend a lot of time speaking about the benefits of ...

Cloud Security

Identifying Network Anomalies in Microsoft Azure – Cloud Workload Security and Azure Network Watcher

Monitoring the Microsoft Azure virtual network Network Watcher is a native Azure service which provides performance monitoring and diagnostic services for Azure tenants. A plethora of logging and diagnostic data are available through Network Watcher which enable insights to your network performance and health. By combining the diagnostic and monitoring ...

Cloud Security

Finals Week: Cloud Edition

It’s almost summertime—where the nights are longer and the water is warmer! Before we head to the beach it’s time to review all the things we learned about the cloud from the past two quarters. For #CloudFinalsWeek we’re asking you to prove your knowledge on the current climate of cloud ...

Cloud Security

The Cloud: Crossroads or Fast Lane for Enterprise Databases?

As someone who has enjoyed spending time with many a DBA (database administrator) over the years, and for better or worse has spun up a fair few DBMS (Database Management System) himself, I’m excited and also just a little scared of the potential that the hybrid cloud holds. It is ...

Cloud Security

The Ramifications of the Skills Shortage on Cloud Security

Week over week, a new threat against valuable data emerges. Sometimes, adversaries in cybersecurity find ways to infiltrate systems through advanced malware strains. Other times, they’ll find holes in an organization’s infrastructure, which have been accidentally created by a well-intentioned employee. Both occur all too often, but the latter is ...

Cloud Security

Enriching Cloud Threat Intelligence and Visibility – Cloud Workload Security and AWS GuardDuty

This blog was written by Stan Golubchik. Using cloud-native threat intelligence to enhance workload security Risk assessment is crucial in today’s public cloud. In Amazon Web Services (AWS), native monitoring services for ingress and egress network data can shed light on potential network threats and anomalies. A service of AWS, ...

Cloud Security

Cloud is Ubiquitous and Untrusted

As we release the resulting research and report at the 2018 RSA Conference, the message we learned this year was clear: there is no longer a need to ask whether companies are in the cloud, it’s an established fact with near ubiquitous (97%) acknowledgement.

Subscribe to McAfee Securing Tomorrow Blogs