Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Insider Threats Deserve Attention, Solutions in Government: Report

As the persistence of insider threats remain a critical issue for government agencies to face. Security leaders like McAfee  have responded by prioritizing solutions that can mitigate insider threats in their pipeline. Government agencies have begun implementing policy changes that can help reduce the risk of an insider threat that ...

Cloud Security

93% of Cloud Services in Healthcare Are Medium to High Risk

New Research Highlights Gap Between Real-World Usage and HIPAA Obligations Today, we released our first-ever Cloud Adoption & Risk in Healthcare Report, with anonymized cloud usage data from over 1.6 million employees at healthcare providers and payers. Unlike surveys that ask people to self report their behavior, our report is the ...

Cloud Security

Top 10 Compliance Security Questions CISOs Ask Their Security Teams

Cloud applications are a mission-critical part of companies’ IT infrastructure today, and it’s increasingly common for employees to upload highly sensitive information to the cloud. In fact, McAfee’s analysis of cloud usage indicates that 22% of files uploaded to file sharing services contain sensitive or confidential data. Moreover, 37% of ...

Cloud Security

9 Cloud Computing Security Risks Every Company Faces

The worldwide cloud computing market is expected to grow to $191 billion by 2020, according to analyst firm Forrester, up from $91 billion in 2015. There are numerous advantages of cloud computing driving a secular move to the cloud; among them lower cost, faster time to market, and increased employee ...

Identity Protection

Be Cautious When Using Wi-Fi

The proliferation of mobile devices means that we can work or play online from almost anywhere, so it’s no surprise that public Wi-Fi networks have become more common. From hotels and coffee shops, to universities and city centers, Wi-Fi is widely available, but is connecting to these networks safe? If ...

Executive Perspectives

An Effective Community Is More Than Just An Online Forum

It is important to develop a strong base of contributors who can communicate effectively, answer questions, and summarize issues.  Like many companies today, our success is dependent on the community of customers and partners that grows around our products and services. This community augments and extends our capabilities with complementary ...

Cloud Security

LastPass Breach By The Numbers: 91% of Enterprises Exposed

Many LastPass users found out on social media or on news sites earlier this week that LastPass experienced a significant security breach. While the password vaults that contain users passwords are not believed to have been compromised, cyber attackers gained access to users’ email addresses, password reminder questions, server per ...

McAfee Labs

Leading Enterprisewide Transformation – an Interview with Gartner

This blog post was written by Patty Hatter. Introduction In this interview, Patty Hatter shares with Gartner Vice President Michael Leckie the story of how she lead the charge on a series of high-value, enterprise-wide initiatives to enable new business capabilities that have driven both productivity and improved digital experiences ...

Cloud Security

Poll: 9 Common Data Security Questions CISOs Ask Their Teams

As many CISOs will tell you, IT security today is all about protecting data, not data centers. This data-centric view is largely a product of data moving to the cloud and mobile and it’s so relevant today that Gartner focuses on this in their latest research on protecting data in ...

McAfee Labs

‘Evoltin’ POS Malware Attacks via Macro

Over the past couple of months McAfee Labs has seen an increase in the usage of macros to deliver malware. This kind of malware, as mentioned in previous posts (Dridex, Bartallex), usually arrives as an attached document within a phishing email. Recently McAfee labs came across a point-of-sale (POS) malware ...

Subscribe to McAfee Securing Tomorrow Blogs