Enterprise

An Unmatched Customer Experience

I’ve been in this industry for over twenty years, and the advancements in cybersecurity over the last few years are unmatched. As an industry, we went from believing in a best-in-breed, siloed approach and now we understand our customers need a connected security architecture that can protect, detect, and correct. ...

Security Operations

OpenDXL Case Study: Sandbox Mania featuring Cuckoo and Wildfire

This blog was written by Barbara Kay. To unleash creativity, my middle school art teacher occasionally offered up all the painting, woodcarving, pottery, and collage resources in the studio, with no guidelines or constraints other than our imaginations and the available class time. The results ranged from the mundane to ...

Endpoint Security Security Operations

Super Hero like Speed on DXL

Superheroes are part of the lore of American culture — the thought of human-being acquiring superhuman power such as flight, invisibility, breathing underwater has always been intriguing to many.  The thought of speed and agility is one of those sets of powers that has caught a lot of attention — ...

Enterprise Español

Inteligencia de amenazas para investigación y orquestación con DXL

En mi última publicación hablé sobre los atributos de nuestros adversarios, los motivos por detrás de sus actividades y las metodologías de ataque recientes. También hablé de la curva de eficacia de la defensa contra amenazas, que ilustra cómo disminuye la eficacia de las capacidades de ciberdefensa a lo largo ...

Endpoint Security

It starts with architecture – DXL enhances the approach

Today’s digital world is drastically different than it was 10 years ago.  It is arguably, drastically different than it was 1 year ago.  The migration from on premise solutions to cloud solutions, mobility, IoT, client computing have all evolved to name a few.  The numerous innovations are continually evolving. Those ...

Enterprise Executive Perspectives

Defense Evolved: From Threat Intelligence, to Investigation, to Orchestration with DXL

In my last post, I discussed the attributes of our adversaries, the drivers behind their activities, and their recent attack methodologies. I also discussed the threat defense efficacy curve, which illustrates how cyber defense capabilities decline in efficacy over time as attackers develop countermeasures to evade them. My FOCUS 16 ...

Executive Perspectives

Chance of a Lifetime

This blog was written by Brian Dye. Writing from the FOCUS 16 Security Conference, Wed., Nov. 2 I just came out of one of the most energetic keynote sessions I have ever seen. Chris Young, who heads McAfee, mapped out a vision for the future of our company. It was ...

Enterprise

Shiny Meets Sustainable: OpenDXL as an Orchestration Platform

This blog was written by Barbara Kay. Every now and then I get into a debate about what constitutes a platform. To me, it means connecting functions and data easily and as directly as possible, balancing speed and simplicity and safety. While it’s nice to present this as an architectural ...

Enterprise

Paranoia, OpenDXL, and the Second Economy

This blog was written by Barbara Kay. You are not paranoid. They are out to get you. McAfee research showed that more than half (56%) of 2015 investigations resulted from a targeted activity by criminals, insiders, or nation states. This dominance increases the urgency to change our approach to security ...

Enterprise Executive Perspectives

Dynamic Endpoint – some things are simply better together!

This blog was written by Candace Worley, McAfee’s former Vice President and Chief Technical Strategist. I like chocolate but I don’t seek it out. Peanut butter – I can take it or leave it. But put them together and now you’ve got my attention. Some things are better together. That ...

Subscribe to McAfee Securing Tomorrow Blogs