Enterprise

McAfee Helps You Commit to the Cloud with Confidence

Hybrid environments—whether they are private clouds bridging to public clouds or traditional data centers bridging to public clouds—have become the de facto service architecture for most enterprises. We all want the agility, cost benefits, and competitive advantages associated with the hybrid cloud, but we often hit a wall when it ...

Cloud Security

Cloud Services: Build or Buy?

Cloud computing is here to stay. Like it or not. But how does a cloud computing user know if the system is safe to store and process vital business and personal data? How do cloud service providers build the necessary trust, manage risk, and protect vital data in cloud systems? ...

Cloud Security

How is Security Integrated into DevOps – DevOpsSec, SecDevOps, or DevSecOps?

The world is awash in DevOps, but what does that really mean? Although DevOps can mean several things to different individuals and organizations, ultimately it is about the cultural and technical changes that occur to deliver cloud services in a highly competitive environment. Cultural changes come in the form of ...

Cloud Security

Software-Defined Data Centers Require Software-Defined Security

This blog was written by Candace Worley, McAfee’s former Vice President and Chief Technical Strategist. If you are like most organizations, the majority of your apps have been virtualized but are still running in your own data center[1]. IT has been busy renovating the data center to take advantage of ...

Cloud Security

How Secure Is Your Private Cloud?

Blog post written by Peter Bury. There is a lot of emphasis and excitement around the growth and versatility of public clouds, overshadowing the strong growth and development of private clouds. A private cloud is not just a virtualized infrastructure of compute and storage services. It is an automated and ...

Enterprise

Securing the distributed enterprise: Are you flying blind?

This blog post was written by Raja Patel. As a pilot, flying an aircraft, visibility is fundamental.  In cyber security, our needs are just as fundamental: You can’t protect what you can’t see. In the past, we relied on visibility and controls at the edge of the network – the ...

Cloud Security

McAfee Application Control: Putting Your Whitelist on Autopilot

This blog post was written by Teresa Wingfield. In a previous blog, we talked about how McAfee Application Control uses local and global intelligence to simplify whitelist updates and briefly mentioned our Dynamic Trust Model. Now, let’s take a deeper look at the flexibility our Dynamic Trust Model offers to ...

Subscribe to McAfee Securing Tomorrow Blogs