Data Security

Stay up to date with GDPR, data breach reporting, DLP, and more and learn how to secure your data from device to cloud.

Data Security

Upcoming McAfee Tech Talk on Web Protection and Data Loss Prevention

How Effective is Your Web Security? Evolving Your Internet Defense Strategy Whether it’s a link clicked in a phishing email, or drive-by download from a malicious advertisement – the internet is responsible for more security incidents than any other source of attack. Most organizations still rely on the old model ...

Data Security

How Good Is Your Response to Data Breaches?

Data breaches are commonplace. Every organization that handles sensitive or private data should have a proper capability to respond to an incident. Many companies have a basic set of procedures, while others maintain a mature set of people and processes. A small percentage of organizations over the years have refined their ...

Data Security

Healing an IS Environment with Integrated Security at Boston Medical

Working for a Level 1 trauma center and the busiest emergency room in New England, Boston Medical Center CISO Sumit Sehgal is acutely aware of the role information security plays in keeping critical systems, applications, and data safe so patients can leave the facility in better shape than they arrived. ...

Data Security

Berkshire Health Systems Adopts Protect-Detect-Correct Strategy With McAfee

Paul Doucette, the senior technical security engineer at Berkshire Health Systems, thrives on challenge. “Our biggest security priority is protecting our sensitive business data,” he says. “What keeps me coming back to the office every day is the thrill of being able to detect new threats and correct them before ...

Data Security

The Past, Present, and Future of Phishing and Malware

This blog was written by David Bull, McAfee’s former Director, Enterprise Solution Marketing. In the Digital Age, email is second nature. It’s a commonly accepted method of communication, and a convenient one, at that. With convenience, however, comes danger – especially if you’re not even alerted to the bait! This ...

Data Security

Hidden Low Hanging Avaya IP Office Default Credentials

Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used ...

Subscribe to McAfee Securing Tomorrow Blogs