Data Security

Google Chrome 68 Changes and Their Impact on Data Protection

Google announced in November last year that they planned to make changes to Chrome to improve stability of their browser, specifically by blocking third party applications from injecting code into Chrome’s processes1.  In July, with the release of Chrome 68, they will start to enforce this. While the logic behind ...

Enterprise

An Unmatched Customer Experience

I’ve been in this industry for over twenty years, and the advancements in cybersecurity over the last few years are unmatched. As an industry, we went from believing in a best-in-breed, siloed approach and now we understand our customers need a connected security architecture that can protect, detect, and correct. ...

Cloud Security

The perimeter has changed, so should you

People have wandered a long way outside of the secure walls of corporate computing. Your users are working from more places than you can keep track of. They are using devices you may or may not own, and cloud services you may or may not know about. In fact, about ...

Enterprise McAfee Partners

Looking for a UEBA Solution? Here Are Some Key Considerations Before You Buy

As you begin mapping out your security defense strategy for 2017, you’ve undoubtedly seen a relatively new acronym on your radar—UEBA, or User and Entity Behavior Analytics. This game-changing innovation promises to connect the dots of an attack to provide advanced levels of detection and to unify security. UEBA solutions ...

Data Security

Another Reminder to Not to Let Your Data Guard Down

This blog was written by Ben Cody.  If anything has been proven in recent years, it’s that you don’t have to worry about a data breach happening, you have to count on it. The latest incident involving cloud storage vendor Dropbox casts an onerous spotlight on several issues facing enterprise ...

Enterprise

Could a DNC Data Leak Alter a Presidential Campaign?

This blog post was written by Teresa Chen. If you’re a political junky, there’s no lack of intriguing stories and scandals to accompany this election season’s spicy rhetoric. Now, we’ve got the Democratic National Committee (DNC) admitting that more than 19,000 emails were hacked by bad actors and released by ...

Data Security

Berkshire Health Systems Adopts Protect-Detect-Correct Strategy With McAfee

Paul Doucette, the senior technical security engineer at Berkshire Health Systems, thrives on challenge. “Our biggest security priority is protecting our sensitive business data,” he says. “What keeps me coming back to the office every day is the thrill of being able to detect new threats and correct them before ...

Executive Perspectives

How Is Your Data Getting Out?

It’s 11:00 p.m. Do you know where your data is? Most reports on data theft events concentrate on how the bad guys got into the organization, what failed to stop them, and what information was taken. I often think about how the information was taken out, or exfiltrated, and who ...

Enterprise

Building and Using Your Network of Informants

If you are working in law enforcement, having a network of informants is both a blessing and a curse. A blessing, because they can provide you with information, tips, and clues that you would otherwise miss. A curse, because they may not be the most trustworthy individuals or may see ...

Enterprise

Securosis White Paper: Implementing and Managing a DLP Solution

Chapter 4: “Managing Your Data Loss Prevention Solution” Congratulations on a successful DLP deployment and configuration! If your policies and priorities are well defined, then management won’t pose any difficulties for you and your team. Developing and following efficient day-to-day processes is described in the fourth and final chapter of ...

Subscribe to McAfee Securing Tomorrow Blogs