Time to Get Proactive About Threat Hunting
When I think about the many challenges that threat hunters face nowadays, trust me when I say that I feel...
Endpoint Security 301: When Products, Policies, and People Break Down the Lines of Communication
Security architecture is like the ocean: no one owns it, and it is constantly affected by change. New technologies are...
Response Required: Why Identifying Threats With Your EDR Isn’t Enough
The perpetrator was a master of disguise, outfitting himself as an employee to bypass the extensive preventive security controls and...
It’s Quiz Time! How Well Do You Know Endpoint Security Best Practices?
How confident are you that you have the best security practices in place across your organization? Like most, you probably...
How the Rubber Meets the Road in Human-Machine Teaming
Everywhere you turn today, machine learning and artificial intelligence are being hyped as both a menace to and the savior...
EDR – Not just for Large Enterprises?
When you think of Endpoint Detection and Response (EDR) tools, do you envision a CSI-style crime lab with dozens of...
McAfee Endpoint Security Earns Top Product Award
The AV-TEST Institute, a leading international and independent service provider in the fields of IT security and anti-virus research, has...
Generating Compliance History Reports
When you’re managing a large environment with thousands of endpoints, assuring consistency can be a huge challenge. Imagine that you...
When it Comes to Malware, Actions Can Speak Louder than Words
This blog post was written by Raja Patel. At some point as a child, a parent likely told you, “actions...
Use Tags to Simplify Endpoint Security Management
One thing that sets McAfee apart in endpoint security management is the ability to manage multiple security technologies for hundreds...