Search Results

Security Operations

Leveraging SIEM and Security Analytics for Improved Monitoring of Advanced Threats

This blog post was written by Karl Klaessig. For more than a decade, in response to higher volumes of alerts, security information and event monitoring (SIEM) became an integral component of enterprise security programs. However, the increasing sophistication and complexity of attacks are driving the need for advanced analytics—beyond the ...

Enterprise

Widening Threat Surface and Security Gaps

This blog was written by Maneeza Malik. Digital transformation, the rise of mobile banking, ongoing migration of core banking services to the cloud and a shift towards an omni-banking model have all contributed to an overall wider threat landscape for financial institutions to monitor and manage. This is further exacerbated by ...

Enterprise

We Must Automate Cyber Threat Defense to Survive

On January 23, 2017 President Trump issued an executive order placing a freeze on the hiring of federal civilian employees across the executive branch. The freeze applies to all executive departments and agencies, regardless of the sources of their operational and programmatic funding, with the exception of military personnel. In ...

McAfee Labs

The Cyber Threat Alliance Steps Up to Boost Protection

This blog post was written by Vincent Weafer. With each new cyber threat report, we learn about the increasing volume of new, complex threats appearing across a myriad of server systems, networking equipment, personal computing platforms, and IoT devices. We also read about the real-world challenges that information security professionals ...

Enterprise

Integrations Improve EDR, Intelligence Sharing & Action Across Applications

This blog was written by Barbara Kay. Finding new ways to extract more value from security operations is a hot priority for most CISOs and security architects as they progress toward the goal of a proactive and optimized security operation. But according to our research, 26% of security operations centers ...

Enterprise

McAfee Threat Intelligence Exchange Aids in Saving Money and Saving Lives

For Kirk Davis, Director of Information Security at Vidant Health, tough days at work feature security events big and small. One especially tough day was when the North Carolina not-for-profit healthcare company was attacked by a Cryptowall Trojan that was able to encrypt half a million files before his team ...

McAfee Labs

McAfee Labs 2017 Threats Predictions Zeroes In on Cloud and IoT Threats

This blog post was written by Vincent Weafer. In the McAfee Labs 2017 Threats Predictions report, published today, we cover a lot of ground but focus particularly on two areas that will impact IT security for years to come: threats to the cloud and the Internet of Things. The report ...

Enterprise

Measuring the ROI of Better Threat Defense: A Healthcare Study

This blog was written by Barbara Kay. In the absence of hard figures, improved threat detection can be difficult to sell to executive management, especially when competing with mandated projects and buzzword-rich initiatives. We’ve created a program that helps CISOs influence and drive urgency through quantifiable business outcomes that speak ...

McAfee Labs

Improve Protection Against Cyberattacks Through Shared Threat Intelligence

This blog post was written by Rick Simon. At the RSA Conference 2016 in San Francisco, Chris Young, GM and SVP of McAfee, said that one of the best ways to improve response time to attacks and overall awareness of attacks and adversaries is through the timely sharing of threat ...

McAfee Labs

DHS Accelerates Information Sharing Standards Effort; McAfee to Chair Working Group

This post first appeared at Policy@Intel on March 9. In an effort to accelerate cyber information sharing, and in response to a presidential executive order, the Department of Homeland Security recently announced the formation of the Information Sharing and Analysis Organization (ISAO) Standards Organization. The organization comprises six working groups, ...

Subscribe to McAfee Securing Tomorrow Blogs