Finals Week: Cloud Edition
It’s almost summertime—where the nights are longer and the water is warmer! Before we head to the beach it’s time...
High-Tech & Hackable: How to Safeguard Your Smart Baby Devices
It’s just about as creepy as it gets: A hacker breaking into a smart device in your baby’s nursery. The...
Trivia Time: Test Your Family’s Password Safety Knowledge
Passwords have become critical tools for every citizen of the digital world. Passwords stand between your family’s gold mine of...
Cloud Clustering Vulnerable to Attacks
The authors thank John Fokker and Marcelo CaroVargas for their contributions and insights. In our upcoming talk at the Cloud...
A Brief History of Cloud Computing and Security
According to recent research1, 50% of organizations use more than one public cloud infrastructure vendor, choosing between Amazon Web Services...
Decyphering the Noise Around ‘Meltdown’ and ‘Spectre’
The McAfee Advanced Threat Research (ATR) Team has closely followed the attack techniques that have been named Meltdown and Spectre...
Cloud Risk in a Rush to Adopt – New Research from the SANS Institute
This post was written by Eric Boerger. Twenty-one percent of organizations don’t know if their organization has been breached in the cloud....
At MPOWER, New Tools Give Partners a Defensive Edge
October is always one of the busiest months of my year with the beginning of Q4 in full swing and...
View From the Summit: The Future Looks Bright for Partners
The months leading up to our MPOWER Cybersecurity Summit & Americas Partner Summit are the perfect time to roll up...
Do I Even Need to Secure the Cloud?
This blog was written by Wayne Anderson, previous Enterprise Security Architect at McAfee. You share responsibility for securing your data...