Enterprise

Stay up to date on the latest cybersecurity trends, best practices, security vulnerabilities, and more.

Endpoint Security

Response Required: Why Identifying Threats With Your EDR Isn’t Enough

The perpetrator was a master of disguise, outfitting himself as an employee to bypass the extensive preventive security controls and flee with the contents of the vault. Fortunately, the building was equipped with strong detection security measures, and the burglar—unaware of the location of a laser tripwire—soon set off a ...

Enterprise

The AI (R)evolution: Why Humans Will Always Have a Place in the SOC

In cybersecurity, the combination of men, women and machines can do what neither can do alone — form a complementary team capable of upholding order and fighting the forces of evil. The 20th century was uniquely fascinated with the idea of artificial intelligence (AI). From friendly and helpful humanoid machines ...

Endpoint Security

Threat Hunting or Efficiency: Pick Your EDR Path?

“Do You Want It Done Fast, Or Do You Want It Done Right?” “Yes.” “Help out more with our business objectives.” “Cover an increasing number of endpoints.” “Cut budgets.” “Make it all work without adding staff.” Cybersecurity teams face a lot of conflicting objectives—both within their teams and from upper ...

Enterprise

Ransomware: The Digital Plague that Still Persists

Ransomware began its reign of cyber terror in 1989 and remains a serious and dangerous threat today. In layman’s terms, ransomware is malware that employs encryption to lock users out of their devices or block access to critical data or files. A sum of money, or ransom, is then demanded ...

Enterprise

It’s About Time: Cybersecurity Insights, Visibility, and Prioritization

As McAfee Chief Executive Officer Chris Young said in his 2019 MPOWER Cybersecurity Summit keynote address, time is the most valuable resource that we all share. But time isn’t always on our side – especially when it comes to cybersecurity. “Time is the one constant that we cannot change. It’s ...

Enterprise

TLS 1.3 and McAfee Web Gateway

With the introduction of TLS 1.3 in 2018, IETF’s goal was (and is) to make the Internet a safer and more secure place. Legacy technologies such as the RSA key exchange have been phased out now. Replacing it is a much safer Diffie-Hellman key exchange. There are two main benefits ...

Enterprise

Increasing Value with Security Integration

What would your security team do with an extra 62 days? According to a recent study by IDC, that’s the amount of time the average-sized security team can expect to regain by addressing a lack of security management integration. With just 12 percent of respondents currently using an end-to-end management ...

Enterprise

Top 5 Highlights from MPOWER 2019

Fellow security experts gathered at MPOWER 2019 to strategize, network, and learn about the newest and most innovative ways to ward off advanced cyberattacks. This year’s attendees had a special opportunity to hear from cybersecurity thought leaders as they shared their insights on our ever-changing industry. The latest applications, workload ...

Endpoint Security

Defining Cloud Security – Is It the Endpoint, Your Data, or the Environment?

You’ve heard it once; you’ve heard it a hundred times – “secure the cloud.” But what does that phrase mean? On the surface, it’s easy to assume this phrase means using cloud-enabled security products. However, it’s much more than that. Cloud security is about securing the cloud itself through a combination ...

Cloud Security

Securing the Unsecured: State of Cybersecurity 2019 – Part II

Recently the Straight Talk Insights team at HCL Technologies invited a social panel to discuss a critical question at the center of today’s digital transitions: How do companies target investments and change the culture to avoid being the next victim of a cyberattack? In Part I of the series, we ...

Subscribe to McAfee Securing Tomorrow Blogs