Security Operations

Learn the latest SecOps threats and how McAfee enables SecOps teams to collect, enrich, and share data and turn that data into insights.

Endpoint Security Security Operations

Defending Against Ransomware with McAfee Threat Intelligence Exchange

In a blog last week, I discussed CryptoLocker, a particularly nefarious family of ransomware, and how to defend against it. I thought it would be worthwhile to demonstrate how McAfee Threat Intelligence Exchange can detect and stop malware like ransomware, even if the suspicious file has not been flagged as ...

Security Operations

Intelligent, Actionable, Integrated

Reaping the benefits of SIEM For automated tools such as Security Information and Event Management (SIEM) to improve your security posture and reduce your response time, they need to be intelligent, actionable, and integrated. They need to help you find what’s important so your team can spend more time with ...

Security Operations

Why SIEM is a Winning Security Strategy

This blog post was written by Karl Klaessig. Like most things in life, successful planning for a secure network takes a pre-baked strategy. And, with that strategy comes the actions and tasks needed to carry it out. It’s much like sports – you want to enable your organization to be ...

Security Operations

Cyber Threat Management: A Perfect Fit for McAfee SIEM

This blog was written by Bart Lenaerts-Bergman. Driven by the misfortune of many, Cyber Threat Intelligence exchange and consumption is becoming more proliferated, accessible and standardized. Together with legacy security technologies like Firewall, IPS and Vulnerability Assessment tools, SIEMs have used threat intelligence initially for the most common use-case of ...

Endpoint Security Security Operations

Progress Report: Critical Security Controls Adoption

This blog was written by Barbara Kay. Today the SANS Institute released its survey on adoption of the Top 20 Critical Security Controls (CSCs) for Effective Cyber Defense. It’s a worthwhile read for CISOs and security analysts charged with overseeing security and risk management. The survey documents adoption highlights and hurdles, ...

Security Operations

The Evolution of SIEM: Part 1

This blog post was written by Karl Klaessig. They say you can’t teach an old dog, new tricks—or can you? The technology landscape has changed dramatically over the last 10 years, and many security approaches organizations previously relied on are no match for today’s advanced threats. Tools like Security Information ...

Security Operations

McAfee Named a Leader in Gartner Magic Quadrant for SIEM

This blog post was written by Karl Klaessig. In June, Gartner, Inc. published its annual Magic Quadrant for Security Information and Event Management (SIEM), which evaluates vendors who offer SIEM products on both the ability to execute and completeness of vision. And this year, McAfee holds a spot in the leader’s ...

Endpoint Security Security Operations

Understanding The Ever-Changing Security Landscape

Since starting my career at McAfee in 2002, I have seen so many changes within the company and the security industry at large. New technologies have transformed the relationship between enterprises, their employees, and their critical systems—for better or for worse. And in my role overseeing McAfee’s Security Management business, ...

Security Operations

SIEM Enables Cloud Security & Reduces Time & Resources for Compliance

This blog post was written by Karl Klaessig. DTS is one of the larger systems companies in Germany, with around 140 team members in six locations.  Mid-sized and enterprise companies, as well as public institutions, rely on DTS to meet high data security demands and remain compliant with domestic and ...

Security Operations

Four Pillars Build the Foundation of Successful SIEM

Talking with customers during the past few months, the key topics and questions we heard were all about targeted attacks, threat intelligence, and security information and event management (SIEM). However, there seems be a myth that “once we have SIEM, we will have visibility into threats”—as if SIEM will give ...

Subscribe to McAfee Securing Tomorrow Blogs