Endpoint Security

Get up to date on the latest endpoint solutions and learn how to secure your entire attack surface from enterprise security threats.

Endpoint Security

What A Threat Analyst Really Thinks of Intelligence

When I was a threat analyst, too long ago for me to actually put in writing, I remember the thrill of discovery at the apex of the boredom of investigation. We all know that meme:   And over the years, investigation leads became a little more substantial. It would begin ...

Endpoint Security

Why Ransomware Targets No Longer Need to Wind Up as Ransomware Victims

It was every administrator’s worst nightmare. A small district hospital in western Colorado lost access to 5 years’ worth of patient records after ransomware attackers exploited holes in an aging infrastructure to strike. But it was also an increasingly familiar story as ransomware attackers escalate their attacks and go after ...

Endpoint Security

We’re Named 2020 Gartner Peer Insights Customers’ Choice for Enterprise DLP

The McAfee team is very proud to announce today that, for the second time in a row1, McAfee was named a Gartner Peer Insights Customers’ Choice for Enterprise Data Loss Prevention for its McAfee Data Loss Prevention Solution. We see the recognition as an historic landmark for McAfee because it represents a ...

Endpoint Security

McAfee XDR: Taking Threat Detection and Response to a New Level

In the battle to protect digital data, the stakes have never been higher, and the outcome has never been more uncertain. Enterprises face ever-changing threats to their digital assets both inside and outside the traditional network perimeter from sophisticated threat actors, who use a changing assortment of techniques to find ...

Endpoint Security

Meaningful Context for Your Endpoint Threat Investigations

Threat intelligence (TI) — the art of distilling down everything that is happening globally in the adversarial threatscape and TI Programs – reducing  to what is necessary context for your company and your security team to know and take mitigation action against — is hard. Yet, many companies continue to try and create a threat intelligence capability from the ground up and find that their TI programs are not what they ...

Endpoint Security

Time to Move from Reactive to Proactive Endpoint Security

One of the most useful new ideas in software development (especially in DevOps) is the concept of “shift-left.” Its meaning is simple: The earlier you are able to tackle an issue, the less trouble you will have later by preventing defects early in the software delivery process. But shift-left is ...

Endpoint Security

When Less is More – MVISION EDR Leads Detection Efficiency & Alert Quality

If you are an incident responder, a SOC analyst or a threat hunter, you know how a well-designed EDR solution can augment your visibility, detection, and reaction capabilities. However, in many organizations, a single blue teamer, or how we like to call them, an “all around defender,” may wear all these hats.  Even when all these roles are performed by the same person, ...

Endpoint Security

What the hell does “zero day” even mean anymore?

I seem to have spent a fair amount of my time recently talking to a variety of people about “zero days” and the one thing that has really struck me is that almost everyone has a different view on what a “zero day” actually is….so I figured the time had ...

Endpoint Security

MITRE APT29 Evaluation – Importance of Prevention in Endpoint Security

In our recent Racing with Cozy Bear blog, we covered the concept of Time Based Security and highlighted the value protection brings to the defender. This is not to say that blocking an attack removes the threat actor from the equation. Attack-blocking protection slows down the offender, buying the defender ...

Endpoint Security

Global Managed Detection and Response: Managing EDR Without the Red Bull

Staying on top of threats 24/7, 365 days a year can overwhelm the best SOC analysts. The need for constant vigilance of cyber threats, not to mention security tasks such as new tool installs, running reports and investigations, followed by reporting to exec levels is becoming unsustainable – just like ...

Subscribe to McAfee Securing Tomorrow Blogs