Data Security

Who Let the Data Out? Who, Who, Who, Who? (Part 3 of 3)

It feels like the last song of the concert—this is the final blog in our cybersecurity benchmark series! As every good detective starts with information, we’ve been digging into the classic six “w” questions: who, what, when, where, why, and how. To find those answers for security professionals, data was ...

Enterprise

Who Let the Data Out? Who, Who, Who, Who? (Part 2 of 3)

When data leaks, the cause may seem like a mystery. But cybersecurity professionals know better. Concrete facts exist behind every breach. Just like a song stuck in your head that you can’t name, knowledge brings relief. So let’s continue our discussion of the six “w” questions of cybersecurity: who, what, ...

Enterprise Español

Esté alerta, su información podría ser sustraída…sin que usted lo sepa

This blog was written by Victor Vásquez Cruz. Use su imaginación y “vea” su empresa como algo parecido a su casa: usted guarda dentro de ella datos valiosos sobre sus cuentas de banco, su historial médico y el de su familia (tipo de sangre, análisis clínicos); su empleo (su contrato ...

Data Security

Who Let the Data Out? Who, Who, Who, Who? (Part 1 of 3)

Nowadays, everyone knows how important data is. Who hasn’t seen a sensational news story about a data breach lately? Despite all this public exposure, however, not everyone is qualified to protect organizations against breaches. It takes more than binge-watching a season of Mr. Robot to become a cybersecurity expert, or ...

Data Security

Another Reminder to Not to Let Your Data Guard Down

This blog was written by Ben Cody.  If anything has been proven in recent years, it’s that you don’t have to worry about a data breach happening, you have to count on it. The latest incident involving cloud storage vendor Dropbox casts an onerous spotlight on several issues facing enterprise ...

Data Security

Upcoming McAfee Tech Talk on Web Protection and Data Loss Prevention

How Effective is Your Web Security? Evolving Your Internet Defense Strategy Whether it’s a link clicked in a phishing email, or drive-by download from a malicious advertisement – the internet is responsible for more security incidents than any other source of attack. Most organizations still rely on the old model ...

Enterprise

Could a DNC Data Leak Alter a Presidential Campaign?

This blog post was written by Teresa Chen. If you’re a political junky, there’s no lack of intriguing stories and scandals to accompany this election season’s spicy rhetoric. Now, we’ve got the Democratic National Committee (DNC) admitting that more than 19,000 emails were hacked by bad actors and released by ...

Subscribe to McAfee Securing Tomorrow Blogs