Security Operations

Time to Get Proactive About Threat Hunting

When I think about the many challenges that threat hunters face nowadays, trust me when I say that I feel their pain. Early in my career, I was a Security Engineer in a SOC who scrambled into action upon receiving the proverbial midnight call about an incident.   The system I was part of wasn’t ...

Security Operations

Join the Cyber Security Dance

Automation and orchestration are central to the proverbial cyber security dance between IT operations and security operations center (SOC).  Both functions need to work with each other and establish a rhythm and alignment to keep their organization protected from cyber threats. The lure to automate is driven by the desire ...

Enterprise

MPOWER 2017 Highlights: A Cybersecurity Conference On-Demand

This blog was written by Allison Cerra, McAfee’s former CMO. Conference organizers waited with anticipation. In a sleek, high-tech conference hall glowing with McAfee’s deep signature red, a colossal scoreboard flashed the results of a real-time vote for who would take the stage and speak next. The results were a ...

Security Operations

Time to Close vs. Root Cause – Are we measuring the wrong thing (again)?

This blog was written by Barbara Kay. “Human beings adjust behavior based on the metrics they’re held against. Anything you measure will impel a person to optimize his score on that metric. What you measure is what you’ll get. Period.” – Dan Ariely, Duke University behavioral economist in Harvard Business Review ...

Subscribe to McAfee Securing Tomorrow Blogs