Enterprise

Handling Office 365 Email Hiccups: Take Control to Ensure Email Continuity

This blog was written by David Bull, McAfee’s former Director, Enterprise Solution Marketing. Email is one of those things that most of us can’t live without—and when it goes down, regardless of whether it’s hosted in-house or in the cloud, it can seriously halt business continuity and productivity and can ...

Executive Perspectives

Root of Trust vs. Root of Evil: Part 1

Regulatory compliance is an unloved cost of goods—an expense to be managed, like cafeteria subsidies or fleet fuel costs. Major regulatory gaps are opening around the Internet and Internet of Things (IoT), and especially in the plumbing under the IoT, which is rapidly evolving in a process known as network ...

Executive Perspectives

Securing Private and Hybrid Clouds

This blog post was written by Raja Patel. As-a-service models offer huge opportunities, but also complicate security. Sometimes the easiest way to migrate to a new architectural modelis to let others do the work, others who are experts in their field. This has given rise to many as-a-service models throughout ...

Enterprise McAfee Labs

Understanding the Scope of Venom (CVE-2015-3456)

In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), ...

Enterprise

McAfee and Ericsson: Managed Security Services

Today McAfee and Ericsson are working together to deliver managed security services (MSS) to the world. Why are we so excited to be working with Ericsson? We’re pleased to offer a combination of top-ranked network security products, telecom-grade service levels, speed to market and disruptively priced services with our new ...

Enterprise

Security in the Software Defined Data Center

Today, almost every component of a data center operates as a generalized pool of hardware resources. Whether it is computing power, storage, or networking, you can provision, operate, and manage your resources in the most efficient way for your requirements. Workloads in these Software Defined Data Centers (SDDC) spread across ...

Cloud Security

Top 10 Reasons to Upgrade to ePO 5.1

Enterprises today are fighting an uphill battle when it comes to security. While there is a proliferation of security management and reporting tools available, the lack of integration and visibility can add more complexity and snags rather than less. Working between multiple security systems diverts attention from other tasks in ...

Security Operations

SIEM Enables Cloud Security & Reduces Time & Resources for Compliance

This blog post was written by Karl Klaessig. DTS is one of the larger systems companies in Germany, with around 140 team members in six locations.  Mid-sized and enterprise companies, as well as public institutions, rely on DTS to meet high data security demands and remain compliant with domestic and ...

McAfee Labs

2014 Threats Predictions: Software Defined Networking Promises Greater Control While Increasing Security Risks

This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In this and related posts, McAfee Labs researchers offer their views of new and evolving threats we expect to see in the coming year. This article was written by Ramnath ...

McAfee Labs

2014 Threats Predictions: Cloud Attacks Could Lead to Data Loss

This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In this and related posts, McAfee Labs researchers offer their views of new and evolving threats we expect to see in the coming year. This article was written by Ramnath Venugopalan. ...

Subscribe to McAfee Securing Tomorrow Blogs