Enterprise Security Operations

Building a Sustainable Model for Cybersecurity Talent

Depending on whose study you believe, there is going to be a shortage of 1.5 million or more cybersecurity professionals in 2020.

Enterprise

Is Your SOC Caught in the Slow Lane?

This blog was written by Jason Rolleston. Everybody’s got a device. And the data on that device is moving into the public cloud. Massive amounts of data.  In a world of massive amounts of data, who’s the traffic cop? The Security Operation Center (SOC). But these days the daily flow ...

Enterprise

Black Hat: Humans Collaborate and Team with Machines to Work Smarter

This blog was written by Barbara Kay. Work smarter, not harder. I’ve always liked that mantra (I told my mom I wasn’t procrastinating: I was planning!), and this approach is especially needed in security operations. Today at Black Hat, McAfee announced a wealth of ways we are helping analysts and ...

Security Operations

What WannaCry Means for the SOC

In addition to the endpoint and network operational efforts for WannaCry, this outbreak presents great learning and response opportunities for analysts in the security operations center (SOC). Understanding and automating these best practices will set you up to handle evolving WannaCry activities, as well as the next fast-moving attack. Responding ...

Security Operations

Expanding Automated Threat Hunting and Response with Open DXL

Today everyone is talking about security automation. However, what are the right processes and actions to automate safely? What are the right processes and actions to automate that will actually achieve some security outcome, such as improving sec ops efficiency or reducing attacker dwell time? Just look in the latest ...

Security Operations

OpenDXL Case Study: Sandbox Mania featuring Cuckoo and Wildfire

This blog was written by Barbara Kay. To unleash creativity, my middle school art teacher occasionally offered up all the painting, woodcarving, pottery, and collage resources in the studio, with no guidelines or constraints other than our imaginations and the available class time. The results ranged from the mundane to ...

Subscribe to McAfee Securing Tomorrow Blogs