Security Operations

SOCwise Series: Practical Considerations on SUNBURST

This blog is part of our SOCwise series where we’ll be digging into all things related to SecOps from a practitioner’s point of view, helping us enable defenders to both build context and confidence in what they do.  Although there’s been a lot of chatter about supply chain attacks, we’re going to ...

Security Operations

Time to Get Proactive About Threat Hunting

When I think about the many challenges that threat hunters face nowadays, trust me when I say that I feel their pain. Early in my career, I was a Security Engineer in a SOC who scrambled into action upon receiving the proverbial midnight call about an incident.   The system I was part of wasn’t ...

Security Operations

Join the Cyber Security Dance

Automation and orchestration are central to the proverbial cyber security dance between IT operations and security operations center (SOC).  Both functions need to work with each other and establish a rhythm and alignment to keep their organization protected from cyber threats. The lure to automate is driven by the desire ...

Enterprise

MPOWER 2017 Highlights: A Cybersecurity Conference On-Demand

This blog was written by Allison Cerra, McAfee’s former CMO. Conference organizers waited with anticipation. In a sleek, high-tech conference hall glowing with McAfee’s deep signature red, a colossal scoreboard flashed the results of a real-time vote for who would take the stage and speak next. The results were a ...

Security Operations

Time to Close vs. Root Cause – Are we measuring the wrong thing (again)?

This blog was written by Barbara Kay. “Human beings adjust behavior based on the metrics they’re held against. Anything you measure will impel a person to optimize his score on that metric. What you measure is what you’ll get. Period.” – Dan Ariely, Duke University behavioral economist in Harvard Business Review ...

Subscribe to McAfee Securing Tomorrow Blogs