Security Operations

Time to Get Proactive About Threat Hunting

When I think about the many challenges that threat hunters face nowadays, trust me when I say that I feel...

Endpoint Security

Endpoint Security 301: When Products, Policies, and People Break Down the Lines of Communication

Security architecture is like the ocean: no one owns it, and it is constantly affected by change. New technologies are...

Endpoint Security

Response Required: Why Identifying Threats With Your EDR Isn’t Enough

The perpetrator was a master of disguise, outfitting himself as an employee to bypass the extensive preventive security controls and...

Endpoint Security

It’s Quiz Time! How Well Do You Know Endpoint Security Best Practices?

How confident are you that you have the best security practices in place across your organization? Like most, you probably...

McAfee Enterprise Endpoint Security

How the Rubber Meets the Road in Human-Machine Teaming

Everywhere you turn today, machine learning and artificial intelligence are being hyped as both a menace to and the savior...

McAfee Enterprise Endpoint Security

EDR – Not just for Large Enterprises?

When you think of Endpoint Detection and Response (EDR) tools, do you envision a CSI-style crime lab with dozens of...

Endpoint Security

McAfee Endpoint Security Earns Top Product Award

The AV-TEST Institute, a leading international and independent service provider in the fields of IT security and anti-virus research,  has...

McAfee Enterprise Endpoint Security

Generating Compliance History Reports

When you’re managing a large environment with thousands of endpoints, assuring consistency can be a huge challenge. Imagine that you...

McAfee Enterprise Endpoint Security

When it Comes to Malware, Actions Can Speak Louder than Words

This blog post was written by Raja Patel. At some point as a child, a parent likely told you, “actions...

McAfee Enterprise Endpoint Security

Use Tags to Simplify Endpoint Security Management

One thing that sets McAfee apart in endpoint security management is the ability to manage multiple security technologies for hundreds...

Subscribe to McAfee Securing Tomorrow Blogs