Security Operations

Learn the latest SecOps threats and how McAfee enables SecOps teams to collect, enrich, and share data and turn that data into insights.

Security Operations

How to Boost Security Operations Performance with Human-Machine Teaming Technology

In the lead up to the Security Operations Roadshow in Canada in May, there’s been lots of discussion on the challenges faced by security teams. Security operations teams today struggle with an ever-increasing number of alerts, new zero-day attacks and a lack of skilled resources. Fifty-eight percent of organizations cite employee ...

Security Operations

How McAfee uses Customer Zero to get to decisions faster

The third in a series of three blogs by Grant and Jason Rolleston on the process of identifying actionable insights. In this series, we’ve been examining how data is collected, processed and analyzed. And, because of the complexity of the task at that analysis stage, we’ve been looking at the ...

Security Operations

What humans do better than machines

The second in a series of three blogs by Grant and Jason Rolleston on the process of identifying actionable insights. In the last post in this series, we looked at the process by which data is collected from the operating environment and is then processed and distributed in a consumable ...

Security Operations

Identifying insights that lead to decisions

The first in a series of three blogs by Grant and Jason Rolleston on the process of identifying actionable insights. A couple of weeks ago we discussed the process security operations teams go through to separate the signal from the noise. We reviewed the steps that McAfee has undertaken in ...

Enterprise Security Operations

Building a Sustainable Model for Cybersecurity Talent

Depending on whose study you believe, there is going to be a shortage of 1.5 million or more cybersecurity professionals in 2020.

Security Operations

A Leader-Class SOC: The Sky’s the Limit

This blog was written by Jason Rolleston. This has been quite a year for McAfee, as we not only roll out our vision, but also start to fulfill that vision. We’ve established our world view: endpoint and cloud as the critical control points for cybersecurity and the Security Operations Center ...

Security Operations

Time to Close vs. Root Cause – Are we measuring the wrong thing (again)?

This blog was written by Barbara Kay. “Human beings adjust behavior based on the metrics they’re held against. Anything you measure will impel a person to optimize his score on that metric. What you measure is what you’ll get. Period.” – Dan Ariely, Duke University behavioral economist in Harvard Business Review ...

Security Operations

Can you see me now? Unpacking malware for advanced threat analysis.

This blog was written by Stan Golubchik. A recent McAfee blog ‘Malware Packers Use Tricks to Avoid Analysis, Detection’, highlighted the use of packers as an effective way to slow down analysis and decrease detection by antimalware products. As an engineer with a keen interest in malware, I’m very familiar ...

Security Operations

Advanced Threat Defense is Top Player for Radicati’s Quadrant

This blog was written by Anne Aarness. In this year’s Radicati APT Protection—Market Quadrant, McAfee Advanced Threat Defense attained a position in the Top Players quadrant for the third year running. The Radicati report assesses advanced persistent threat (APT) solutions from major security vendors and places them in its quadrant ...

Security Operations

What WannaCry Means for the SOC

In addition to the endpoint and network operational efforts for WannaCry, this outbreak presents great learning and response opportunities for analysts in the security operations center (SOC). Understanding and automating these best practices will set you up to handle evolving WannaCry activities, as well as the next fast-moving attack. Responding ...

Subscribe to McAfee Securing Tomorrow Blogs