Consumer

#CyberAware: Will You Help Make the Internet a Safe Place for Families?

Don’t we all kinda secretly hope, even pretend, that our biggest fears are in the process of remedying themselves? Like believing that the police will know to stay close should we wander into a sketchy part of town. Or that our doors and windows will promptly self-lock should we forget ...

Family Safety

College Bound? 7 Important Technology Habits for Students

You’ve loved, shaped, and equipped your child to succeed in college and move in day is finally here.  But there’s still one variable that can turn your child’s freshman year upside down, and that’s technology. That’s right, that essential laptop and indispensable smartphone your child owns could also prove to ...

Cloud Security

Finals Week: Cloud Edition

It’s almost summertime—where the nights are longer and the water is warmer! Before we head to the beach it’s time to review all the things we learned about the cloud from the past two quarters. For #CloudFinalsWeek we’re asking you to prove your knowledge on the current climate of cloud ...

Family Safety

High-Tech & Hackable: How to Safeguard Your Smart Baby Devices

It’s just about as creepy as it gets: A hacker breaking into a smart device in your baby’s nursery. The Internet of Things (IoT) has wrapped our homes technology, which means any piece of technology you own — be it a smartphone, a thermostat, or even a baby toy or ...

Consumer Family Safety

Trivia Time: Test Your Family’s Password Safety Knowledge

Passwords have become critical tools for every citizen of the digital world. Passwords stand between your family’s gold mine of personal data and the entirety of the internet. While most of us have a love-hate relationship with passwords, it’s beneficial to remember they do serve a powerful purpose when created ...

McAfee Labs

Cloud Clustering Vulnerable to Attacks

The authors thank John Fokker and Marcelo CaroVargas for their contributions and insights. In our upcoming talk at the Cloud Security Alliance Summit at the RSA Conference, we will focus our attention on the insecurity of cloud deployments. We are interested in whether attackers can use compromised cloud infrastructure as ...

Enterprise Cloud Security

A Brief History of Cloud Computing and Security

According to recent research1, 50% of organizations use more than one public cloud infrastructure vendor, choosing between Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform and a series of others. 85% of those using more than one cloud infrastructure provider are managing up to four1, seeking the best fit ...

McAfee Labs

Decyphering the Noise Around ‘Meltdown’ and ‘Spectre’

The McAfee Advanced Threat Research (ATR) Team has closely followed the attack techniques that have been named Meltdown and Spectre throughout the lead-up to their announcement on January 3. In this post, McAfee ATR offers a simple and concise overview of these issues, to separate fact from fiction, and to ...

Security Operations

A Leader-Class SOC: The Sky’s the Limit

This blog was written by Jason Rolleston. This has been quite a year for McAfee, as we not only roll out our vision, but also start to fulfill that vision. We’ve established our world view: endpoint and cloud as the critical control points for cybersecurity and the Security Operations Center ...

Enterprise Cloud Security

Cloud Risk in a Rush to Adopt – New Research from the SANS Institute

This post was written by Eric Boerger. Twenty-one percent of organizations don’t know if their organization has been breached in the cloud. That uncertainty, lack of control, and limited visibility is a startling indication of the state of cloud use today: The speed of adoption has invited risk that was not foreseen. ...

Subscribe to McAfee Securing Tomorrow Blogs