Featured Blogs
How I Thrive in Technology at McAfee
By: Hannah, Software Quality Assurance Engineer I joined the McAfee Quality Assurance team at the Brighton office earlier this year....
How I Seized McAfee’s Opportunities to Realize My Potential
This post was written by Emmanuel Making the most of opportunities and putting in the work with an employer who...
How I Got Here: Trevor’s Career Journey Across Four Countries and Five Roles
In this career-journey series, Marketing Director Trevor shares why patient listening is the most helpful skill he’s acquired, the top...
How Hackers Bypassed an Adobe Flash Protection Mechanism
The number of Flash Player exploits has recently declined, due to Adobe’s introduction of various measures to strengthen Flash’s security....
How Do You #PressForProgress?
By Marty, Regional Sales Director March 8th marks the 108th year the world has celebrated International Women’s Day. During those...
How Chinese Cybercriminals Use Business Playbook to Revamp Underground
Preface Because of its longevity and technical sophistication, the Russian cybercriminal underground has long been the benchmark for threat researchers...
How Can We Stop ‘ROP’ Cyberattacks?
IBM recently announced a software-oriented solution to help eradicate attacks by return-oriented programming (ROP) malware. ROP malware is a significant...
How a Group of McAfee Team Members Helped Change the Lives of Critically Ill Children
The generosity and kindness displayed by team members across McAfee is one major factor that makes up the incredible culture of the company....
How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise
In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds’s Orion IT monitoring and management...