The Clock Is Ticking: Can You Find and Kill Advanced Malware Before it Kills Your Endpoints?
Your company’s computer system has been compromised by disguised malware. There is no greater feeling of dread for a security...
At MPOWER, New Tools Give Partners a Defensive Edge
October is always one of the busiest months of my year with the beginning of Q4 in full swing and...
MPOWER 2017 Highlights: A Cybersecurity Conference On-Demand
This blog was written by Allison Cerra, McAfee’s former CMO. Conference organizers waited with anticipation. In a sleek, high-tech conference...
Migrate to the New McAfee Endpoint Security (ENS)
The traditional IT model of waiting for early adopters to work through any bugs before you install new software makes...
An Unmatched Customer Experience
I’ve been in this industry for over twenty years, and the advancements in cybersecurity over the last few years are...
With McAfee ENS, Swedish Town Gains More Secure Environment Requiring Less Work
For Jens Lindström, who oversees security operations for Norrköpings Kommun, a Swedish town of 140,000 inhabitants, ransomware was becoming his...
Become a Modern Endpoint Security Master
A new wave of advanced, targeted malware is seeking out the gaps in conventional endpoint defenses and finding novel ways...
Let the Great McAfee ENS 10.5 Migration Begin!
Since I started writing blogs last year, I’ve experienced some great interaction from the partner community – your perspectives, comments,...
Disclosures, Updates, and Patches: the Cycle of Life in Cybersecurity
This week saw a public disclosure of a flaw in a cybersecurity company’s software (ESET), that would allow remote code...
Dynamic Endpoint – some things are simply better together!
This blog was written by Candace Worley, McAfee’s former Vice President and Chief Technical Strategist. I like chocolate but I...