Cyber Resilience And Spear Phishing
Balanced security capability, defense in depth, integrated countermeasures, and a threat-intelligence strategy are critical to defending your business from spear-phishing...
Insider Threats Deserve Attention, Solutions in Government: Report
As the persistence of insider threats remain a critical issue for government agencies to face. Security leaders like McAfee have...
An Effective Community Is More Than Just An Online Forum
It is important to develop a strong base of contributors who can communicate effectively, answer questions, and summarize issues. Like...
Defending Cyber-Physical Systems from Attack Chains
A strong defense against compromise involves three layers: hardening devices, securing communications, and monitoring behavior. If criminals breach data security...
Defending Against the Dark Arts Isn’t Just for Wizards
This blog was written by Candace Worley, McAfee’s former Vice President and Chief Technical Strategist. Expelliarmus! Wouldn’t it be nice...
We Tried the NIST Framework and It Works
By Kent Landfield, Director of Standards and Technology Policy, McAfee, and Malcolm Harkins, Chief Security and Privacy Officer at McAfee...
Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own
Director Michael Mann’s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity...