Securing Tomorrow. Today.

How McAfee Can Help You Scale Security to Employees Working from Home

We’re in a moment of rapid change for our IT environments. As companies shift from working in an office within their controlled network to working from home, many are finding that the architectures they have in place aren’t ready for the scalability and security challenges of a decentralized workforce.

Read Blog
Life at McAfee

10 McAfee Women Share Top Career Highlights

Looking to reach your career best? At McAfee, we invest in your growth and development to help you get there. In honor of Women’s History Month, we asked members of our McAfee Women in Security Community (WISE) to share their favorite experiences at past and present jobs, including what they ...

Cloud Security

Cloud Security: Why You Need Device Control

With remote working, BYOD, employees using their own devices and shared access to collaborative cloud apps from business partners – we need to include device control when allowing access to our cloud services. Many cloud services have admin options to restrict access and functionality, sadly many of these features are ...

Family Safety

Little Ones Online More? Here Are 10 Basics To Keep Them Safe

Online safety conversations look dramatically different depending on the age and stage of your child. For very young children, toddlers through elementary school, parents have a golden opportunity to lay the foundations that will shape a child’s digital perspectives and behaviors for a lifetime. One way to keep younger children ...

Consumer Threat Notices

Scams Facing Consumers in the New Digital WFH Landscape

With many people having their normal day to day life turned upside down, scammers are capitalizing on consumers’ newfound lifestyles to make a financial gain or wreak havoc on users’ devices. Let’s take a look at the most recent threats that have emerged as a result of the pandemic.   Fraudulent Relief Checks On Wednesday March 25, the Senate passed a relief bill that contains a substantial increase in unemployment benefits ...

McAfee Labs

Ransomware Maze

EXECUTIVE SUMMARY The Maze ransomware, previously known in the community as “ChaCha ransomware”, was discovered on May the 29th 2019 by Jerome Segura[1]. The main goal of the ransomware is to crypt all files that it can in an infected system and then demand a ransom to recover the files. ...

Executive Perspectives

COVID-19 & Voting: When Paper is the Safest Election Technology

There are concerns that the COVID-19 pandemic will discourage voters from turning out to vote in person for this year’s U.S. presidential primaries and general election.  State governments are considering alternative voting processes to protect voters and election officials from infection at the polls. As strange as it may sound ...

Executive Perspectives

Interoperability Is Key To Cybersecurity – A Conversation at CSIS

Interoperability – a subject that for too long cybersecurity companies have treated as an inconvenient nuisance – is finally getting the attention it deserves. In February, I had the opportunity to discuss the critical nature of interoperability with true security experts in the public and private sectors. We agreed that ...

Family Safety

Honey, We’re Home! Securing Your Devices and Your Family Bond  

More and more parents and their kids are experiencing what it’s like to work and learn together from home these days. With this increase in device use, it’s more important than ever to verify that all the technology humming under your roof is as secure as possible. Securing family technology ...

Enterprise

How McAfee Can Help You Scale Security to Employees Working from Home

We’re in a moment of rapid change for our IT environments. As companies shift from working in an office within their controlled network to working from home, many are finding that the architectures they have in place aren’t ready for the scalability and security challenges of a decentralized workforce. There are ...

Consumer

How To Stop Phone Spoofing

How Does Phone Spoofing Work? Call spoofing is when the caller deliberately sends false information to change the caller ID. Most spoofing is done using a VoIP (Voice over Internet Protocol) service or IP phone that uses VoIP to transmit calls over the internet. VoIP users can usually choose their ...

Subscribe to McAfee Securing Tomorrow Blogs