Family Safety

IoT Lockdown: Ways to Secure Your Family’s Digital Home and Lifestyle

If you took an inventory of your digital possessions chances are, most of your life — everything from phones to toys, to wearables, to appliances — has wholly transitioned from analog to digital (rotary to wireless). What you may not realize is that with this dramatic transition, comes a fair amount of ...

McAfee Labs

McAfee ePO Platform Gains Insight Into Threat Research

The latest update to the McAfee® ePolicy Orchestrator® platform offers a new add-in to provide insight into the latest analysis carried out by McAfee Labs and the Advanced Threat Research team.

McAfee Labs

Self-Signed Certificates Can Be Secure, So Why Ban Them?

This blog was co-written by Brook Schoenfield and Ramnath Venugopalan. In many organizations the use of self-signed certificates is forbidden by policy. Organizations may ban the use of self-signed certificates for several reasons: It is trivially easy to generate a certificate’s key pair without reasonable entropy, to fail protect the ...


Culturas de Prevenção e Tendências de Ameaças

Atualmente, o cibercrime movimenta mais dinheiro que o 28º maior país do mundo, a África do Sul. O montante representa 0,8% do PIB norte-americano e, estima-se ainda que esta modalidade criminosa já seja mais lucrativa que o narcotráfico. No entanto, esses números consideram somente os eventos documentados, pois não são ...


Culturas de Prevención y Tendencias de Amenazas

Actualmente la ciberdelincuencia mueve más dinero que el 28º mayor país del mundo, Sudáfrica. El monto representa el 0,8% del PIB estadunidense y, se estima además que esta modalidad criminal ya es más lucrativa que el narcotráfico. Sin embargo, estos números consideran exclusivamente a los eventos documentados, ya que no ...


An Unmatched Customer Experience

I’ve been in this industry for over twenty years, and the advancements in cybersecurity over the last few years are unmatched. As an industry, we went from believing in a best-in-breed, siloed approach and now we understand our customers need a connected security architecture that can protect, detect, and correct. ...


Let the Great McAfee ENS 10.5 Migration Begin!

Since I started writing blogs last year, I’ve experienced some great interaction from the partner community – your perspectives, comments, questions, etc. It’s been a great way to connect with many of you. Over the next few weeks, starting today, I have some pretty big things on my mind that ...

Endpoint Security Security Operations

McAfee – Cybercrime is a firefight! Time for Automation.

Those who have experienced them know how scary their world becomes when a grass fire or forest fire gets out of control. As these fires become more intense, they create their own weather, generating their own winds, making them more difficult to fight and often moving far faster than firefighters ...

Security Operations

Mission Made Possible: The Open Integration Time Machine

This blog was written by Barbara Kay. A fast-forward button for integration to a unified security architecture. One of the reasons why the Mission Impossible premise has resonated across the generations is that all of us, at one time or another, are handed projects that seem to come with that ...

Family Safety

How Much Control Do You Really Have Over Your Family’s Connected Life?

If you took an inventory of your family’s connected devices, would you have three or four devices, or would it be more like 30? You might be surprised how connected your family has become. The gradual, gadget creep is real, as are the security risks that come with it. While the ...

Subscribe to McAfee Securing Tomorrow Blogs