Security Operations

Learn the latest SecOps threats and how McAfee enables SecOps teams to collect, enrich, and share data and turn that data into insights.

Security Operations

Advanced Threat Defense is Top Player for Radicati’s Quadrant

This blog was written by Anne Aarness. In this year’s Radicati APT Protection—Market Quadrant, McAfee Advanced Threat Defense attained a position in the Top Players quadrant for the third year running. The Radicati report assesses advanced persistent threat (APT) solutions from major security vendors and places them in its quadrant ...

Security Operations

What WannaCry Means for the SOC

In addition to the endpoint and network operational efforts for WannaCry, this outbreak presents great learning and response opportunities for analysts in the security operations center (SOC). Understanding and automating these best practices will set you up to handle evolving WannaCry activities, as well as the next fast-moving attack. Responding ...

Security Operations

Expanding Automated Threat Hunting and Response with Open DXL

Today everyone is talking about security automation. However, what are the right processes and actions to automate safely? What are the right processes and actions to automate that will actually achieve some security outcome, such as improving sec ops efficiency or reducing attacker dwell time? Just look in the latest ...

Security Operations

Security Automation is Here —The Time is Now: 60% of respondents think manual processes are holding back security effectiveness

This blog was written by Barbara Kay. There was a time when automation was a dirty word in security. Now, it is a necessity. A new Enterprise Strategy Group (ESG) survey, sponsored by McAfee and other technology vendors, shows that 3 out of 5 organizations see manual processes as holding ...

Security Operations

OpenDXL Case Study: Sandbox Mania featuring Cuckoo and Wildfire

This blog was written by Barbara Kay. To unleash creativity, my middle school art teacher occasionally offered up all the painting, woodcarving, pottery, and collage resources in the studio, with no guidelines or constraints other than our imaginations and the available class time. The results ranged from the mundane to ...

Security Operations

The Power of an Integrated UEBA/SIEM Solution

This blog post was written by Kristen Jacobsen. If you’ve read our previous blog, “Leveraging UEBA Capabilities in Your Existing SIEM,” you understand how McAfee Enterprise Security Manager can perform many essential UEBA functions leveraging its built-in advanced analytics and behavior modeling. Doing It Better Together For several specific use ...

Security Operations

How Coordinated, Collaborative Security Can Help You Defeat Unknown Malware

This blog was written by Stan Golubchik. In a previous blog, “How to Gain a Competitive Advantage with an Integrated Approach to Security,” we’ve shown you how adding an advanced threat analysis technology to a large enterprise security ecosystem is contributing to its success both operationally and from a business ...

Security Operations

Leveraging SIEM and Security Analytics for Improved Monitoring of Advanced Threats

This blog post was written by Karl Klaessig. For more than a decade, in response to higher volumes of alerts, security information and event monitoring (SIEM) became an integral component of enterprise security programs. However, the increasing sophistication and complexity of attacks are driving the need for advanced analytics—beyond the ...

Security Operations

Gain a Competitive Advantage with an Integrated Approach to Security

This blog was written by Anne Aarness. Simply adding an advanced threat analysis technology to your security stack can expand detection and solve some immediate security issues. But thinking beyond standalone detection to an integrated ecosystem can not only improve detection and protection throughout your organization, it can also enhance ...

Security Operations

Leveraging UEBA Capabilities in Your Existing SIEM

This blog post was written by Kristen Jacobsen. User and entity behavior analytics (UEBA) uses advanced analytics to track and flag suspicious behaviors of both users and assets, such as networked assets, sensors, databases, devices, and hosts. There are many reasons why UEBA is gaining traction as both an integrated ...

Subscribe to McAfee Securing Tomorrow Blogs