Featured Blogs
Comprehensive and Integrated Security at a Regional Commercial Bank
Isn’t it time to invest in a security solution that doesn’t break the bank? One bank offers a textbook case study in corporate data security, since by definition it’s required to safeguard clients’ highly sensitive personal and financial data. This U.S.-based regional commercial bank has undergone a sea of change ...
When You’re Overwhelmed With Alerts, It’s Time to Automate
In a number of recently publicized breaches, and probably many other attacks, information that could have enabled the security team to catch and contain the attack were lost in the sheer volume of alerts. Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential ...
McAfee DXL: Momentum toward an Open, Integrated Security Architecture
This blog was written by Scott Montgomery, McAfee’s previous vice president and chief technology officer of public sector. It takes a village. With today’s vast cybercriminal network churning out sophisticated attacks by the minute, it’s virtually impossible for any single security solution to combat today’s threats alone. For years, organizations ...
A Brand New McAfee Threat Intelligence Exchange 1.2!
In their recent 2015 Global Business Technographics® Security Survey, Forrester reports that improving threat intelligence capabilities is a top priority for 71% of enterprises. But enterprises don’t need to improve their ability to gather threat intelligence—the abundance of shared intelligence and threat inputs is already overwhelming for security teams. Operationalizing ...
Defending Against Ransomware with McAfee Threat Intelligence Exchange
In a blog last week, I discussed CryptoLocker, a particularly nefarious family of ransomware, and how to defend against it. I thought it would be worthwhile to demonstrate how McAfee Threat Intelligence Exchange can detect and stop malware like ransomware, even if the suspicious file has not been flagged as ...
Progress Report: Critical Security Controls Adoption
This blog was written by Barbara Kay. Today the SANS Institute released its survey on adoption of the Top 20 Critical Security Controls (CSCs) for Effective Cyber Defense. It’s a worthwhile read for CISOs and security analysts charged with overseeing security and risk management. The survey documents adoption highlights and hurdles, ...
Understanding The Ever-Changing Security Landscape
Since starting my career at McAfee in 2002, I have seen so many changes within the company and the security industry at large. New technologies have transformed the relationship between enterprises, their employees, and their critical systems—for better or for worse. And in my role overseeing McAfee’s Security Management business, ...
Thinking Outside of the Sandbox: McAfee Advanced Threat Defense Unveiled
It’s always a great day when you can share something so innovative that it will surely change the game in the industry. Today, at the McAfee FOCUS 2013 conference, McAfee and my team announced the development and launch of McAfee Advanced Threat Defense – the newest addition to our Security ...