Enterprise

Stay up to date on the latest cybersecurity trends, best practices, security vulnerabilities, and more.

Enterprise

Defending Against the Dark Arts Isn’t Just for Wizards

This blog was written by Candace Worley, McAfee’s former Vice President and Chief Technical Strategist. Expelliarmus!  Wouldn’t it be nice if that worked in the real world? Unfortunately, there’s no magic charm that can be used as ‘Defense Against the Dark Arts’ against cyberthreats and malware. Every minute there are ...

Data Security

Hidden Low Hanging Avaya IP Office Default Credentials

Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used ...

Security Operations

Why SIEM is a Winning Security Strategy

This blog post was written by Karl Klaessig. Like most things in life, successful planning for a secure network takes a pre-baked strategy. And, with that strategy comes the actions and tasks needed to carry it out. It’s much like sports – you want to enable your organization to be ...

Enterprise

Battle of the Cloud Gateways – How does McAfee Web Protection Stack Up?

This blog was written by David Bull, McAfee’s former Director, Enterprise Solution Marketing. As the flood of threats spreading online today grows, the risk of getting infected by a virus increases as well, without the appropriate security solutions. Just a few years ago, new viruses cropped up every few days. ...

Enterprise

Networked Healthcare and the Internet of Things: Rewards versus Risks

The Internet of Things (IoT) is upon us and it is not only moving into our homes through our networks and refrigerators, it is also moving into our bodies through networked medical devices. Wearable, temporarily ingested, or even embedded devices for medical treatment, medication and general health and wellness represent ...

Security Operations

Cyber Threat Management: A Perfect Fit for McAfee SIEM

This blog was written by Bart Lenaerts-Bergman. Driven by the misfortune of many, Cyber Threat Intelligence exchange and consumption is becoming more proliferated, accessible and standardized. Together with legacy security technologies like Firewall, IPS and Vulnerability Assessment tools, SIEMs have used threat intelligence initially for the most common use-case of ...

Enterprise

Blocking Web Threats – What is a CISO to Do?

Many organizations today are being led to believe that all they need for a secure network is a next generation firewall (NGFW) solution. As countless point-product firewall vendors try to position their product as a silver bullet for all security issues, top security analyst Jon Oltsik of Enterprise Strategy Group ...

Enterprise

Social engineering attacks you might see in the IoT

Futher to my last post about social engineering in the IoT; here are a couple of attack scenarios that we might easily see emerge. Attack scenario 1: Reflected targeting and compromise Things are often too limited in processing and memory to compromise and manipulate to large effect. What is more, ...

Enterprise

Securosis White Paper: Implementing and Managing a Data Loss Prevention Solution

Chapter 1: Preparing to Deploy Data Loss Prevention”  Deploying a data loss prevention (DLP) solution can be intimidating, but take heart—it’s not as daunting as you might think if you approach it step by step. In his four-chapter white paper, Implementing and Managing a Data Loss Prevention Solution, Rich Mogull, analyst ...

Enterprise Executive Perspectives

Social Engineering in the Internet of Things (IoT)

Successful social engineering attacks through IoT systems could lead to a perception of being surrounded by hostile devices, and greatly retard development; making the consequences of social engineering attacks in the IoT very significant. Social engineering attacks will certainly evolve into the Internet of Things (IoT), if they have not ...

Subscribe to McAfee Securing Tomorrow Blogs