Cloud Security

Stuck on Windows Server 2003? Migration Option #3

This blog was written by Joakim Lialias. Pop quiz: what’s happening on July 14th, 2015? If you’ve been following along...

Cloud Security

Bye, Bye Windows Server 2003 – Hello, Hackers

This blog was written by Joakim Lialias. Still running a Windows Server 2003? You’ll want to read this. As you...

Executive Perspectives

Application Layer Exfiltration Protection: A New Perspective on Firewalls

Organizations must adopt a new way of thinking about safeguarding sensitive data from theft and unauthorized exfiltration. The recent slew...

McAfee Enterprise

‘Golden Hour’ Incident Response Agility

Security leaders must encourage and integrate data, processes, and controls to facilitate comprehension and investment of precious human capital in...

Security Operations

Intelligent, Actionable, Integrated

Reaping the benefits of SIEM For automated tools such as Security Information and Event Management (SIEM) to improve your security...

Executive Perspectives

Defending Cyber-Physical Systems from Attack Chains

A strong defense against compromise involves three layers: hardening devices, securing communications, and monitoring behavior.  If criminals breach data security...

McAfee Enterprise

Defending Against the Dark Arts Isn’t Just for Wizards

This blog was written by Candace Worley, McAfee’s former Vice President and Chief Technical Strategist. Expelliarmus!  Wouldn’t it be nice...

Endpoint Security Security Operations

Progress Report: Critical Security Controls Adoption

This blog was written by Barbara Kay. Today the SANS Institute released its survey on adoption of the Top 20 Critical...

Subscribe to McAfee Securing Tomorrow Blogs