Endpoint Security Security Operations

When You’re Overwhelmed With Alerts, It’s Time to Automate

In a number of recently publicized breaches, and probably many other attacks, information that could have enabled the security team...

Security Operations

Fastpass to SIEM ROI via Pre-built content for analysts and responders

In our previous Blog, we covered how customizing SIEM for threat management requires both resources and expertise.  As a result,...

Security Operations

Is Your SIEM ‘Ready To Go?’

The massive amount of log, event and flow data within the SIEM offers security analysts answers to essential security questions...

Security Operations

Four Ways to Stretch Your SIEM For Complete Protection

This blog post was written by Karl Klaessig. Organizations and enterprises today are more aware than ever of the dangers...

Security Operations

Seven key SIEM actions to thwart attacks in the security “Golden Hour”

This blog was written by Bart Lenaerts-Bergman. As cyber criminals move faster and stealthier, taking advantage of new tools provided...

McAfee Enterprise

Building and Using Your Network of Informants

If you are working in law enforcement, having a network of informants is both a blessing and a curse. A...

Security Operations

Intelligent, Actionable, Integrated

Reaping the benefits of SIEM For automated tools such as Security Information and Event Management (SIEM) to improve your security...

Security Operations

Why SIEM is a Winning Security Strategy

This blog post was written by Karl Klaessig. Like most things in life, successful planning for a secure network takes...

Security Operations

Cyber Threat Management: A Perfect Fit for McAfee SIEM

This blog was written by Bart Lenaerts-Bergman. Driven by the misfortune of many, Cyber Threat Intelligence exchange and consumption is...

Endpoint Security Security Operations

Progress Report: Critical Security Controls Adoption

This blog was written by Barbara Kay. Today the SANS Institute released its survey on adoption of the Top 20 Critical...

Subscribe to McAfee Securing Tomorrow Blogs