Enterprise Security Operations

Building a Sustainable Model for Cybersecurity Talent

Depending on whose study you believe, there is going to be a shortage of 1.5 million or more cybersecurity professionals in 2020.

Enterprise

Is Your SOC Caught in the Slow Lane?

This blog was written by Jason Rolleston. Everybody’s got a device. And the data on that device is moving into the public cloud. Massive amounts of data.  In a world of massive amounts of data, who’s the traffic cop? The Security Operation Center (SOC). But these days the daily flow ...

Enterprise

Separating the Signal from Noise

This blog was written by Grant Bourzikas, previous CISO at McAfee. In security operations, we frequently talk about the difficulties in separating the signal from the noise to detect legitimate threats and disregard false alarms. Data overload is a common problem and triage becomes a critical skill to hone and ...

Enterprise

A Model for Human and Machine Interaction: Human-Machine Teaming Grows up

Security operation centers (SOCs) are struggling to keep up with attackers, and artificial intelligence (AI) has failed to deliver significant improvements. The industry has been successful at applying AI to malware detection and user and entity behavior analytics (UEBA) using deep neural networks and anomaly detection. But other core SOC ...

Security Operations

A Leader-Class SOC: The Sky’s the Limit

This blog was written by Jason Rolleston. This has been quite a year for McAfee, as we not only roll out our vision, but also start to fulfill that vision. We’ve established our world view: endpoint and cloud as the critical control points for cybersecurity and the Security Operations Center ...

Enterprise

Safe Soaring: McAfee Advances Customer Success with Integrated Analytics, Ecosystems, and Experiences at MPOWER

This blog was written by Barbara Kay. Security embodies the analogy of fixing a plane in flight. Every company has some variety of security people, process, and technology in place already. So, like a plane in flight, your security infrastructure needs an operational model that can be updated, adapted, repaired, ...

Enterprise

Introducing McAfee Investigator: Automated, Expert System-Based Analytics to Transform the SOC

This blog was written by Barbara Kay. SOC analysts are getting beaten up by both commodity attacks and sophisticated ones, with many companies taking far more than a day or a week to close a case and few consistently digging all the way to root cause. McAfee research collected in ...

McAfee Labs

Tips for Effective Threat Hunting

This blog was co-written by Ramnath Venugopalan. In May, McAfee surveyed more than 700 IT and security professionals around the world to better understand how threat hunting is used in organizations and how they hope to enhance their threat hunting capabilities. You can read the full study: Disrupting the Disruptors, ...

Security Operations

Time to Close vs. Root Cause – Are we measuring the wrong thing (again)?

This blog was written by Barbara Kay. “Human beings adjust behavior based on the metrics they’re held against. Anything you measure will impel a person to optimize his score on that metric. What you measure is what you’ll get. Period.” – Dan Ariely, Duke University behavioral economist in Harvard Business Review ...

Subscribe to McAfee Securing Tomorrow Blogs