[breadcrumb]
Security Operations

Expanding Automated Threat Hunting and Response with Open DXL

Today everyone is talking about security automation. However, what are the right processes and actions to automate safely? What are...

Security Operations

OpenDXL Case Study: Sandbox Mania featuring Cuckoo and Wildfire

This blog was written by Barbara Kay. To unleash creativity, my middle school art teacher occasionally offered up all the...

Executive Perspectives

How Working Together Accelerates Our Evolution

This blog post was written by Vincent Weafer. It is no secret that the end goal for cybersecurity companies is...

Security Operations

Mission Made Possible: The Open Integration Time Machine

This blog was written by Barbara Kay. A fast-forward button for integration to a unified security architecture. One of the...

Endpoint Security

It starts with architecture – DXL enhances the approach

Today’s digital world is drastically different than it was 10 years ago.  It is arguably, drastically different than it was...

McAfee Enterprise Executive Perspectives

Defense Evolved: From Threat Intelligence, to Investigation, to Orchestration with DXL

In my last post, I discussed the attributes of our adversaries, the drivers behind their activities, and their recent attack...

Executive Perspectives

Chance of a Lifetime

This blog was written by Brian Dye. Writing from the FOCUS 16 Security Conference, Wed., Nov. 2 I just came...

McAfee Enterprise

Shiny Meets Sustainable: OpenDXL as an Orchestration Platform

This blog was written by Barbara Kay. Every now and then I get into a debate about what constitutes a...

McAfee Enterprise

Paranoia, OpenDXL, and the Second Economy

This blog was written by Barbara Kay. You are not paranoid. They are out to get you. McAfee research showed...

Subscribe to McAfee Securing Tomorrow Blogs