Enterprise

Surviving the Deluge: Lifecycle Support for the SOC

This blog was written by Barbara Kay. For the last month, my corner of Northern California has endured record-breaking inundation from the skies, leading to mud slides, downed power lines, road closures, and, in my case at least, propane and power outages. It’s been hard to stay productive, stretching the ...

Security Operations

Mission Made Possible: The Open Integration Time Machine

This blog was written by Barbara Kay. A fast-forward button for integration to a unified security architecture. One of the reasons why the Mission Impossible premise has resonated across the generations is that all of us, at one time or another, are handed projects that seem to come with that ...

Enterprise

Continuous Monitoring Can Help You Stop the Bad Guys in Their Tracks

Most security organizations have historically been focused on the prevention portion of the prevent-detect-correct threat defense lifecycle. The proliferation of some high-profile security breaches in the past few years, however, has demonstrated the weakness in that strategy. Cracks exist in even the most formidable security defenses. Attackers have become ever ...

Enterprise Español

Cómo Ayuda Threat Intelligence Exchange a Ahorrar Dinero y Salvar Vidas

Para Kirk Davis, Director de Seguridad de la Información en Vidant Health, los días de trabajo complejos siempre se acompañan de eventos de seguridad. Uno de esos días sucedió, cuando la compañía de cuidado de la salud de Carolina del Norte fue atacada con el Troyano Cryptowall, que fue capaz ...

Cloud Security

Container Sprawl: The Next Great Security Challenge

Containers, the younger and smaller siblings of virtualization, are more active and growing faster than a litter of puppies. Recent stats for one vendor show containers now running on 10% of hosts, up from 2% 18 months ago. Adoption is skewed toward larger organizations running more than 100 hosts. And ...

Enterprise

Measuring the ROI of Better Threat Defense: A Healthcare Study

This blog was written by Barbara Kay. In the absence of hard figures, improved threat detection can be difficult to sell to executive management, especially when competing with mandated projects and buzzword-rich initiatives. We’ve created a program that helps CISOs influence and drive urgency through quantifiable business outcomes that speak ...

Endpoint Security Security Operations

McAfee at work: A brief recap of Black Hat 2016

Another Black Hat USA conference has come and gone, but, much like every year, a lot of incredible insights remain. And McAfee was a major contributor to those insights. Our presenting researchers offered several great demonstrations this year, but three sessions stood out particular for their insight into future ransomware ...

Security Operations McAfee Partners

CompuCom Launches Cloud-Based Managed Service Powered by McAfee

This blog was written by Richard Steranka. Today, from Black Hat 2016 in Las Vegas, CompuCom announced the expansion of its Managed Security Services (MSS) through  the release of its upgraded Security Information and Event Management (SIEM) services. In my earlier blog, I spoke about the cyberskills shortage  and the ...

Endpoint Security Security Operations

Boston Medical Center Finds Security Integration With McAfee

How important is a comprehensive, fully integrated security strategy for an enterprise? Just ask Michelle Duprey, Manager of Information Security at Boston Medical Center (BMC). The academic medical center, based in Boston, is the largest safety-net hospital in New England. A business that robust demands a modern security defense. When ...

Enterprise

Upcoming McAfee Analyst Webcast, Tech Talks on SIEM

Each month, we’ll highlight upcoming webcasts and Tech Talks on industry trends and topics in a blog post. See below for can’t-miss online events coming up with McAfee: Integrating and Operationalizing Threat Intelligence Threat intelligence can provide valuable information and insight, however, the growing volume of data can quickly become ...

Subscribe to McAfee Securing Tomorrow Blogs