Security Operations

Four Pillars Build the Foundation of Successful SIEM

Talking with customers during the past few months, the key topics and questions we heard were all about targeted attacks, threat intelligence, and security information and event management (SIEM). However, there seems be a myth that “once we have SIEM, we will have visibility into threats”—as if SIEM will give ...

Enterprise

Stealth Attacks: Why Hackers Love Networks That Are ‘Crunchy on the Outside and Chewy on the Inside’

The advertising slogan “crunchy on the outside and chewy on the inside” has been used by companies to market candy, cookies, and even tacos. The slogan is particularly relevant given some of the predictions in the McAfee Labs 2014 Predictions Report. Specifically, the crunchy/chewy model illuminates the prediction that deals ...

McAfee Labs

2014 Threats Predictions: Cybercrime and Hacktivism Will Continue to Grow

This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In this and related posts, McAfee Labs researchers offer their views of new and evolving threats we expect to see in the coming year. This article was written by François ...

McAfee Labs

2014 Threats Predictions: Cloud Attacks Could Lead to Data Loss

This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In this and related posts, McAfee Labs researchers offer their views of new and evolving threats we expect to see in the coming year. This article was written by Ramnath Venugopalan. ...

Executive Perspectives

McAfee Launches First Cyber Defense Center in the Middle East

I hope you enjoyed a great summer vacation with your families and loved ones. Personally I had a wonderful and sunny holiday with my family in the south of Spain. Do you remember those days when the summers were quiet and peaceful?  Where almost nothing notable was happening? I am ...

Enterprise

Accessibility Requirements in the Internet of Things

In system engineering, and good system design begins with establish good “requirements”.  Requirements are not just technical and engineering features, they can also be operational (what are the designed configuration features,  what is the required uptime, downtime or service interval, etc) and requirements can be business-orient related to regulatory obligations ...

Enterprise

Cloud Computing for Critical Infrastructure

Cloud computing continues to be a hot topic. But so what if people are talking about it, who is actually adopting it? One of the questions I have been asking myself is, ‘Will cloud be adopted for critical infrastructure? And what is the security perspective on this? Naturally a blog ...

Subscribe to McAfee Securing Tomorrow Blogs