Enterprise

Helping Overburdened SOC Analysts Become More Effective Threat Hunters

Security operations center analysts confront a tough paradox almost daily. In a perfect world, every SOC would have the resources to 1) proactively hunt or search for the presence of adversaries in the network, and 2) for analysts tasked with incident response activities, to profile the types of threats that ...

Enterprise

Continuous Monitoring Can Help You Stop the Bad Guys in Their Tracks

Most security organizations have historically been focused on the prevention portion of the prevent-detect-correct threat defense lifecycle. The proliferation of some high-profile security breaches in the past few years, however, has demonstrated the weakness in that strategy. Cracks exist in even the most formidable security defenses. Attackers have become ever ...

Enterprise

Enhanced Certificate Security – Pinning

Written by Deepak Choudhary There are always risks involved when relying on a third party to send and receive sensitive data over secure network channels. While we recognize the roles of the Public Key Infrastructure (PKI) and third party certificate authority (CA), we also believe that Certificate SSL Pinning can ...

Data Security

Hidden Low Hanging Avaya IP Office Default Credentials

Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used ...

Executive Perspectives

What a Breach can Teach: It Starts with a Strategy

This blog was written by Brett Kelsey. This is part II in a series on proactive defense using a proven professional services security methodology To me, the human body is a miracle and a mystery.  But, I often think the same thing about the growing complexity of enterprise networks and ...

Subscribe to McAfee Securing Tomorrow Blogs