Security Operations

Learn the latest SecOps threats and how McAfee enables SecOps teams to collect, enrich, and share data and turn that data into insights.

Cloud Security Security Operations

5 Things You Need to Know About Integrated Security in the Cloud

Whatever the specific configuration of your cloud, be it public, private, or a mix of both, there are security risks that aren’t immediately apparent, ranging from the technical to organizational to issues of governance. Here are five things you need to know about integrating security across your multiple cloud deployments ...

Security Operations Español

Códigos Zero-Day, multiplataforma creciente para 2016

This blog was written by Victor Vásquez Cruz. Actualizar la aplicación utilizada diariamente en una empresa es una actividad que un usuario —o tal vez el administrador— de la red empresarial decide realizar en algún momento para aprovechar las nuevas funcionalidades de la versión reciente de algún programa que seguramente ...

Endpoint Security Security Operations

When You’re Overwhelmed With Alerts, It’s Time to Automate

In a number of recently publicized breaches, and probably many other attacks, information that could have enabled the security team to catch and contain the attack were lost in the sheer volume of alerts. Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential ...

Security Operations

Threat Intelligence-Based Approaches & Strategies, Application Control 7.0

This blog post was written by Teresa Wingfield. Security experts have long debated the merits of whitelisting versus blacklisting. While the first intuitively seems more secure, the reality is that whitelisting is also more difficult to implement and manage. Strategic decisions are driven by organizational needs, which seems to recast ...

Endpoint Security Security Operations

A Brand New McAfee Threat Intelligence Exchange 1.2!

In their recent 2015 Global Business Technographics® Security Survey, Forrester reports that improving threat intelligence capabilities is a top priority for 71% of enterprises. But enterprises don’t need to improve their ability to gather threat intelligence—the abundance of shared intelligence and threat inputs is already overwhelming for security teams. Operationalizing ...

Security Operations

Fastpass to SIEM ROI via Pre-built content for analysts and responders

In our previous Blog, we covered how customizing SIEM for threat management requires both resources and expertise.  As a result, McAfee created “ready to go” content packs based on Gartner’s Top Use cases.  targeting aspiring users to expand their SIEM detection and response use cases without spending countless hours and ...

Security Operations

Is Your SIEM ‘Ready To Go?’

The massive amount of log, event and flow data within the SIEM offers security analysts answers to essential security questions such as “who is accessing critical business systems,” or, more importantly, “was there any anomalous activity before, during or after the connection?” To get all these answers, though, users need ...

Security Operations

Stop Malware Dead in Its Tracks – 4 Steps to Detect & Eradicate Threats

Nineteen percent of advanced targeted attacks take weeks to discover. Fourteen percent take months to find. And, unfortunately two percent take several years to surface. With undetected attacks lurking around every corner, you need tools that can identify and eradicate threats fast. The State of Detection and Correction Unfortunately, even ...

Security Operations

Four Ways to Stretch Your SIEM For Complete Protection

This blog post was written by Karl Klaessig. Organizations and enterprises today are more aware than ever of the dangers posed by cybercriminals and advanced persistent threats (APTs). So, how can they fight back against these online threats in a situation where one size never fits all? One solution that ...

Security Operations

Seven key SIEM actions to thwart attacks in the security “Golden Hour”

This blog was written by Bart Lenaerts-Bergman. As cyber criminals move faster and stealthier, taking advantage of new tools provided through an adversarial community, security teams need to be able to respond with equal or greater speed. Every second counts after a cyber attack. Therefore, it is imperative to have ...

Subscribe to McAfee Securing Tomorrow Blogs