Family Safety

How to Safeguard Your Family Against A Medical Data Breach

The risk to your family’s healthcare data often begins with that piece of paper on a clipboard your physician or hospital asks you to fill out or in the online application for healthcare you completed. That data gets transferred into a computer where a patient Electronic Health Record (EHR) is ...

Enterprise

An Unmatched Customer Experience

I’ve been in this industry for over twenty years, and the advancements in cybersecurity over the last few years are unmatched. As an industry, we went from believing in a best-in-breed, siloed approach and now we understand our customers need a connected security architecture that can protect, detect, and correct. ...

Security Operations

Security Automation is Here —The Time is Now: 60% of respondents think manual processes are holding back security effectiveness

This blog was written by Barbara Kay. There was a time when automation was a dirty word in security. Now, it is a necessity. A new Enterprise Strategy Group (ESG) survey, sponsored by McAfee and other technology vendors, shows that 3 out of 5 organizations see manual processes as holding ...

Enterprise

How McAfee Threat Intelligence Exchange Aids in Saving Money and Saving Lives

For Kirk Davis, Director of Information Security at Vidant Health, tough days at work feature security events big and small. One especially tough day was when the North Carolina not-for-profit healthcare company was attacked by a Cryptowall Trojan that was able to encrypt half a million files before his team ...

McAfee Labs

Improve Protection Against Cyberattacks Through Shared Threat Intelligence

This blog post was written by Rick Simon. At the RSA Conference 2016 in San Francisco, Chris Young, GM and SVP of McAfee, said that one of the best ways to improve response time to attacks and overall awareness of attacks and adversaries is through the timely sharing of threat ...

McAfee Labs

DHS Accelerates Information Sharing Standards Effort; McAfee to Chair Working Group

This post first appeared at Policy@Intel on March 9. In an effort to accelerate cyber information sharing, and in response to a presidential executive order, the Department of Homeland Security recently announced the formation of the Information Sharing and Analysis Organization (ISAO) Standards Organization. The organization comprises six working groups, ...

Endpoint Security Security Operations

What’s Better than McAfee Threat Intelligence Exchange? A Brand New McAfee Threat Intelligence Exchange 1.2!

In their recent 2015 Global Business Technographics® Security Survey, Forrester reports that improving threat intelligence capabilities is a top priority for 71% of enterprises. But enterprises don’t need to improve their ability to gather threat intelligence—the abundance of shared intelligence and threat inputs is already overwhelming for security teams. Operationalizing ...

McAfee Labs

Best practices for preventing Dridex infections

Mitigating the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of McAfee security products. Browse the product guidelines available here (click Knowledge Center, and select Product Documentation from the Support Content list) to mitigate the threats based on the behavior described ...

McAfee Labs Français

Dridex Best Practices

Limiter et protéger votre entreprise contre les attaques de type Dridex peut se faire à différents niveaux d’interception : Fichiers, Registre, URL et IP, et celà à travers plusieurs technologies des gammes de produits McAfee. La protection contre ce type de codes malveillants extrêment volatile nécessite une approche multi niveaux et une ...

Security Operations

Four Ways to Stretch Your SIEM For Complete Protection

This blog post was written by Karl Klaessig. Organizations and enterprises today are more aware than ever of the dangers posed by cybercriminals and advanced persistent threats (APTs). So, how can they fight back against these online threats in a situation where one size never fits all? One solution that ...

Subscribe to McAfee Securing Tomorrow Blogs