Search Results

McAfee Labs

‘McAfee Labs 2016 Threats Predictions’ Report Forecasts Changes

This blog post was written by Vincent Weafer. In the McAfee Labs 2016 Threats Predictions report, published today, we developed two distinct views of the future. For the first section of the report, we interviewed 21 key people within  McAfee Labs, Foundstone Professional Services, and the Office of the CTO’s Advanced Threat Research ...

Executive Perspectives

Results- vs. Device-Centric Threats: Why Cyber-Attacks Should be in the WMD Conversation

This week we’re heading to Colorado for the Aspen Institute’s annual Aspen Security Forum. I’ll be speaking on a Friday panel entitled “WMD: The Nightmare Scenario,” discussing the application of cyber-attacks against critical infrastructure such as water systems, power plants, the electric grid, and industrial systems such as chemical plants. ...

Enterprise

Adaptive Threat Prevention, Attack Discovery to Containment in Milliseconds

In the “Verizon 2013 Data Breach and Investigations Report” 80% of cases (examined by Verizon) a breach wasn’t detected for at least weeks, if not months or years.  Once a detection was made the data suggests that in 79% of cases it took days, weeks or months to contain, which ...

Executive Perspectives

World Economic Forum Sets High Bar on Public-Private Cybersecurity Partnerships

This week’s World Economic Forum (WEF) in Davos, Switzerland featured the launch of the World Economic Forum System Initiative on Shaping the Future of Digital Economy and Society, a global platform for coalitions of public and private sector entities to “collaborate and accelerate progress against shared digital economy goals and ...

Life at McAfee

Everyday Hero: 5 Questions with McAfee Labs’ Paula Greve

iWith cybersecurity experts taking center stage this week at the Black Hat conference in Las Vegas, the world is watching for the release of the latest breakthrough research, development, and trends. Paula Greve, a principal engineer leading the data science team within McAfee Labs, is on the front lines of ...

Enterprise

Show me the money – Financial Services Need to Rethink Security

Financial institutions are under attack. As gatekeepers to consumers’ and enterprises’ most personal and private information, this industry serves as one of the most lucrative avenues for cybercriminals to pursue. In response, financial services organizations have developed unsustainable security infrastructures that are characterized by a huge proliferation of tools to ...

Data Security

Pervasive Data Protection: Kick the Quick-Fix & Go for a Unified Defense

This blog was written by Ben Cody.  The cloud is here to stay—and no one in the enterprise playing field would argue that point. Cloud adoption across nearly every business unit is a reality that CISOs have fully accepted. Now the big uphill battle for security professionals is how to ...

Security Operations

The Power of an Integrated UEBA/SIEM Solution

This blog post was written by Kristen Jacobsen. If you’ve read our previous blog, “Leveraging UEBA Capabilities in Your Existing SIEM,” you understand how McAfee Enterprise Security Manager can perform many essential UEBA functions leveraging its built-in advanced analytics and behavior modeling. Doing It Better Together For several specific use ...

Enterprise

Incentives Drive Results

This blog was written by Candace Worley, McAfee’s former Vice President and Chief Technical Strategist. The Challenges of Misaligned Incentives in Cybersecurity Cybercriminals are encouraged by their results, stealing money, breaking services, or gaining notoriety, and can quickly change tactics that are ineffective. But what encourages a cybersecurity team to ...

Cloud Security

Why You Need a Multi-Layer Approach to Public Cloud Security

This blog was written by Scott Montgomery, McAfee’s previous vice president and chief technology officer of public sector. Would you hand your house keys to a total stranger and then go away on vacation for two weeks? Probably not, but that’s precisely what some businesses do when they move applications ...

Subscribe to McAfee Securing Tomorrow Blogs