Endpoint Security

Get up to date on the latest endpoint solutions and learn how to secure your entire attack surface from enterprise security threats.

Endpoint Security

Following Ransomware’s Path to Extortion

  It comes as no surprise that ransomware is the fastest growing form of criminal malware, accelerating in quantity 128% year over year. This plethora of ransomware is, however, primarily acting across one type of playing field- the web. In fact, 80% of the methods used to deliver criminal malware ...

Endpoint Security

It starts with architecture – DXL enhances the approach

Today’s digital world is drastically different than it was 10 years ago.  It is arguably, drastically different than it was 1 year ago.  The migration from on premise solutions to cloud solutions, mobility, IoT, client computing have all evolved to name a few.  The numerous innovations are continually evolving. Those ...

Endpoint Security Security Operations

McAfee at work: A brief recap of Black Hat 2016

Another Black Hat USA conference has come and gone, but, much like every year, a lot of incredible insights remain. And McAfee was a major contributor to those insights. Our presenting researchers offered several great demonstrations this year, but three sessions stood out particular for their insight into future ransomware ...

Endpoint Security Security Operations

Boston Medical Center Finds Security Integration With McAfee

How important is a comprehensive, fully integrated security strategy for an enterprise? Just ask Michelle Duprey, Manager of Information Security at Boston Medical Center (BMC). The academic medical center, based in Boston, is the largest safety-net hospital in New England. A business that robust demands a modern security defense. When ...

Endpoint Security Security Operations

Banking on Advanced Protection: Comprehensive and Integrated Security at a Regional Commercial Bank

Isn’t it time to invest in a security solution that doesn’t break the bank? One bank offers a textbook case study in corporate data security, since by definition it’s required to safeguard clients’ highly sensitive personal and financial data. This U.S.-based regional commercial bank has undergone a sea of change ...

Endpoint Security Security Operations

When You’re Overwhelmed With Alerts, It’s Time to Automate

In a number of recently publicized breaches, and probably many other attacks, information that could have enabled the security team to catch and contain the attack were lost in the sheer volume of alerts. Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential ...

Endpoint Security

McAfee Data Exchange Layer: Momentum toward an Open, Integrated Security Architecture

It takes a village. With today’s vast cybercriminal network churning out sophisticated attacks by the minute, it’s virtually impossible for any single security solution to combat today’s threats alone. For years, organizations have resorted to layering security technologies and deploying best-of-breed point solutions at various control points, trying to achieve ...

Endpoint Security Security Operations

What’s Better than McAfee Threat Intelligence Exchange? A Brand New McAfee Threat Intelligence Exchange 1.2!

In their recent 2015 Global Business Technographics® Security Survey, Forrester reports that improving threat intelligence capabilities is a top priority for 71% of enterprises. But enterprises don’t need to improve their ability to gather threat intelligence—the abundance of shared intelligence and threat inputs is already overwhelming for security teams. Operationalizing ...

Endpoint Security Security Operations

Defending Against Ransomware with McAfee Threat Intelligence Exchange

In a blog last week, I discussed CryptoLocker, a particularly nefarious family of ransomware, and how to defend against it. I thought it would be worthwhile to demonstrate how McAfee Threat Intelligence Exchange can detect and stop malware like ransomware, even if the suspicious file has not been flagged as ...

Endpoint Security Security Operations

Progress Report: Critical Security Controls Adoption

This blog was written by Barbara Kay. Today the SANS Institute released its survey on adoption of the Top 20 Critical Security Controls (CSCs) for Effective Cyber Defense. It’s a worthwhile read for CISOs and security analysts charged with overseeing security and risk management. The survey documents adoption highlights and hurdles, ...

Subscribe to McAfee Securing Tomorrow Blogs