Consumer Family Safety

Artificial Intelligence: Friend Or Foe?

This blog was written by Ian Yip.  The future of cyber safety and personal development lies in the partnership between humans and machines. While our primary interactions with the digital world today may be through our PCs, laptops, smartphones, and smart watches, in the future they will become much more ...

Enterprise

An Unmatched Customer Experience

I’ve been in this industry for over twenty years, and the advancements in cybersecurity over the last few years are unmatched. As an industry, we went from believing in a best-in-breed, siloed approach and now we understand our customers need a connected security architecture that can protect, detect, and correct. ...

Endpoint Security Security Operations

McAfee – Cybercrime is a firefight! Time for Automation.

Those who have experienced them know how scary their world becomes when a grass fire or forest fire gets out of control. As these fires become more intense, they create their own weather, generating their own winds, making them more difficult to fight and often moving far faster than firefighters ...

Enterprise

Visibility underpins cloud security. Can you see clearly now?

How much do you really know about your organization’s exposure in the cloud? Can you say with any degree of certainty how many cloud applications your employees use, what data is being shared and stored there and who has access to it? If your answer is no to some or ...

Enterprise

No more excuses – time to get a grip on your cloud security

Cloud use continues to grow rapidly in the enterprise and has unquestionably become a part of mainstream IT – so much so that many organisations now claim to have a ‘cloud-first’ strategy. That’s backed up by a survey* we commissioned here at McAfee that questioned 1,200 cloud security decision-makers across ...

Enterprise

Don’t get hooked – phishing email advice for your employees

There’s justifiably a lot of noise right now from the security industry about the increasing sophistication of the latest cybercrime threats to businesses – particularly those from well-funded organised criminal operations or other shadowy sources. While it’s essential to understand and protect against these new stealthier threats it’s easy for ...

Enterprise

The data exfiltration threat of connected devices

Businesses are already battling to try and keep up in the fight against well-resourced and sophisticated cybercrime attacks. One of the growing and evolving threats in this security landscape is data exfiltration. What is data exfiltration? At a basic level it is essentially data loss or data theft but it ...

Enterprise

Herd immunity and security in a networked world

There is a long history of people comparing IT security to biology, most obviously perhaps with the term virus. Sometimes this analogy is useful, sometimes less so. I wanted to look into what public health officials call ‘herd immunity’ and whether it applies to our cybersecurity needs. The term herd ...

Enterprise

Governments need to act on critical national infrastructure cybersecurity threats

Cyberattacks on critical national infrastructure have the potential to cause massive damage and disruption to entire nations. And research suggests that the threat is growing. A recent survey of CNI organisations in North and South America, for example, reveals 43 per cent have seen an increase in cyberattacks over the ...

Enterprise

3 key security challenges for the Internet of Things

What challenges pose the biggest threat to the Internet of Things? The Internet of Things (IoT) is already starting to give rise to real-world applications, from connected homes and cars to health monitoring and smart utility meters. Analyst Gartner predicts there will be 26 billion IoT devices – excluding PCs, ...

Subscribe to McAfee Securing Tomorrow Blogs