Security Operations

Fastpass to SIEM ROI via Pre-built content for analysts and responders

In our previous Blog, we covered how customizing SIEM for threat management requires both resources and expertise.  As a result, McAfee created “ready to go” content packs based on Gartner’s Top Use cases.  targeting aspiring users to expand their SIEM detection and response use cases without spending countless hours and ...

Executive Perspectives

Your “Check Security” Light is On

Please restart your car in safe mode Your car may not get a “Check Security” light in the future, but it might get an “Update Software” light. In addition to Drive, Reverse, and Park, it may also get a Safe mode with diminished but sufficient functions to get home or ...

Executive Perspectives

Vulnerable From Below: Attacking Hypervisors Using Firmware And Hardware

Malicious attacks with firmware privileges can compromise an entire system, so it is especially important to apply measures to reduce the risks. Breaking hypervisor isolation and attacking — or exploiting — neighbouring virtual machines is a prominent goal of cyber criminals. At the Black Hat USA 2015 and DEF CON ...

Executive Perspectives

Defending Critical Infrastructure Without Air Gaps And Stopgap Security

This blog post was written by Raja Patel. Traditional IT security solutions need modifications to successfully defend critical infrastructure on tomorrow’s cyber battlefields. There has recently been a great amount of discussion regarding critical infrastructure and its inherent security vulnerabilities. Critical infrastructure primarily comprises aging supervisory control and data acquisition ...

Consumer Threat Notices

Remote Jeep Hacking Successful: Time to Patch Your Car?

This blog post was written by Bruce Snell. Next month I’ll be moving back to the US after a few years living in Japan. While moving internationally can be a headache, one of the fun things about it is shopping for a new car. I’ve had my eye on a ...

Executive Perspectives

What Morpho Means: Why Hackers Target Intellectual Property And Business-Confidential Information

A quiet, professional cyberespionage group steals what every company wants to keep secret: valuable information that drives business. Welcome to the new normal. Corporate cyberespionage made the front page yesterday with the news of Morpho, also known as Wild Neutron. Regardless of what you call it, these revelations were the ...

Executive Perspectives

Cyber Resilience And Spear Phishing

Balanced security capability, defense in depth, integrated countermeasures, and a threat-intelligence strategy are critical to defending your business from spear-phishing attacks. Spear phishing continues to be the most successful means of gaining entry to an enterprise network and to valuable business or personal data. According to the latest Verizon Data ...

Enterprise

Insider Threats Deserve Attention, Solutions in Government: Report

As the persistence of insider threats remain a critical issue for government agencies to face. Security leaders like McAfee  have responded by prioritizing solutions that can mitigate insider threats in their pipeline. Government agencies have begun implementing policy changes that can help reduce the risk of an insider threat that ...

Executive Perspectives

An Effective Community Is More Than Just An Online Forum

It is important to develop a strong base of contributors who can communicate effectively, answer questions, and summarize issues.  Like many companies today, our success is dependent on the community of customers and partners that grows around our products and services. This community augments and extends our capabilities with complementary ...

Executive Perspectives

Defending Cyber-Physical Systems from Attack Chains

A strong defense against compromise involves three layers: hardening devices, securing communications, and monitoring behavior.  If criminals breach data security and steal credit card numbers or personal information, your company suffers loss of reputation and potentially significant intangible costs. If they breach security of your cyber-physical control systems, you could ...

Subscribe to McAfee Securing Tomorrow Blogs