Enterprise

Stay up to date on the latest cybersecurity trends, best practices, security vulnerabilities, and more.

Enterprise

2019 Recap: A Year to Remember

Working Even Harder To End the Cybersecurity Talent Shortage The term “skills gap” is all too familiar to those in the cybersecurity industry. A recent ISACA survey found only 18% of respondents said they believed the cybersecurity skills gap will be mostly or entirely filled during the upcoming decade, while ...

Cloud Security

Independent Research Firm Ranks CWS Vendors in Report: McAfee a Leader

Forrester, a leading independent research firm in the field of cybersecurity, recently published its inaugural WAVE report on Cloud Workload Security. We’re proud to report that McAfee was named a leader. The Forrester Wave evaluates and ranks products in the CWS category against 30 pre-defined criteria. The report provides security ...

Data Security

Cybersecurity & Artificial Intelligence (AI) – a view from the EU Rear Window, Part II

In Part I of this blog, we discussed the debate around AI: what it is, whether it exists, and to what extent it plays a role in our daily lives. In Part II, we turn our focus to the future, and how AI must be developed deliberately and thoughtfully to ...

Endpoint Security

Endpoint Security 301: When Products, Policies, and People Break Down the Lines of Communication

Security architecture is like the ocean: no one owns it, and it is constantly affected by change. New technologies are introduced, staff changes occur, and as a result, communication suffers. I often see environments where ownership is placed into silos across teams in the enterprise, meaning IT administrators preventing threats ...

Enterprise

McAfee Up Levels Insights for Customers

Authored by Anand Ramanathan McAfee recently announced MVISION Insights designed to help customers proactively detect, rank and respond quickly and accurately to threats. On top of having to respond to threats that persistently target their companies, security professionals also face another huge challenge – prioritizing what threat information is relevant ...

Data Security

Cybersecurity & Artificial Intelligence (AI) – a view from the EU Rear Window, Part I

Much has been said about the power of AI and how tomorrow’s CISO won’t be able to provide efficient cybersecurity without it. The hype surrounding AI is based on both the quickening pace of natural language capability development and the current deficiency of capable and competent cybersecurity professionals. A quick ...

Endpoint Security

Response Required: Why Identifying Threats With Your EDR Isn’t Enough

The perpetrator was a master of disguise, outfitting himself as an employee to bypass the extensive preventive security controls and flee with the contents of the vault. Fortunately, the building was equipped with strong detection security measures, and the burglar—unaware of the location of a laser tripwire—soon set off a ...

Enterprise

The AI (R)evolution: Why Humans Will Always Have a Place in the SOC

In cybersecurity, the combination of men, women and machines can do what neither can do alone — form a complementary team capable of upholding order and fighting the forces of evil. The 20th century was uniquely fascinated with the idea of artificial intelligence (AI). From friendly and helpful humanoid machines ...

Endpoint Security

Threat Hunting or Efficiency: Pick Your EDR Path?

“Do You Want It Done Fast, Or Do You Want It Done Right?” “Yes.” “Help out more with our business objectives.” “Cover an increasing number of endpoints.” “Cut budgets.” “Make it all work without adding staff.” Cybersecurity teams face a lot of conflicting objectives—both within their teams and from upper ...

Enterprise

Ransomware: The Digital Plague that Still Persists

Ransomware began its reign of cyber terror in 1989 and remains a serious and dangerous threat today. In layman’s terms, ransomware is malware that employs encryption to lock users out of their devices or block access to critical data or files. A sum of money, or ransom, is then demanded ...

Subscribe to McAfee Securing Tomorrow Blogs