Enterprise

An Unmatched Customer Experience

I’ve been in this industry for over twenty years, and the advancements in cybersecurity over the last few years are unmatched. As an industry, we went from believing in a best-in-breed, siloed approach and now we understand our customers need a connected security architecture that can protect, detect, and correct. ...

Data Security

Pervasive Data Protection: Kick the Quick-Fix & Go for a Unified Defense

This blog was written by Ben Cody.  The cloud is here to stay—and no one in the enterprise playing field would argue that point. Cloud adoption across nearly every business unit is a reality that CISOs have fully accepted. Now the big uphill battle for security professionals is how to ...

Enterprise Español

Cómo Ayuda Threat Intelligence Exchange a Ahorrar Dinero y Salvar Vidas

Para Kirk Davis, Director de Seguridad de la Información en Vidant Health, los días de trabajo complejos siempre se acompañan de eventos de seguridad. Uno de esos días sucedió, cuando la compañía de cuidado de la salud de Carolina del Norte fue atacada con el Troyano Cryptowall, que fue capaz ...

Enterprise Español

Compartir Inteligencia Sobre Amenazas Contra la Seguridad Cibernética

La seguridad cibernética es un deporte que se juega en equipo. Los maleantes comparten información, habilidades y código cuando se ayudan unos a otros. Las personas honestas hacen la misma cosa para mantenerse al ritmo. Compartir inteligencia de amenazas es un aspecto clave en el que los conocimientos adquiridos por ...

Enterprise Executive Perspectives

Dynamic Endpoint – some things are simply better together!

This blog was written by Candace Worley, McAfee’s former Vice President and Chief Technical Strategist. I like chocolate but I don’t seek it out. Peanut butter – I can take it or leave it. But put them together and now you’ve got my attention. Some things are better together. That ...

Enterprise Español

Cuatro maneras de evitar que el ransomware se ejecute en sus servidores

Los nuevos ransomware de servidores como el caso de SamSam y Maktub están a la caza de víctimas. A diferencia de las antiguas técnicas de ransomware, ahora éste se instala sin acciones determinadas como hacer clic en un enlace o abrir un archivo. En lugar de eso, el ransomware ataca ...

Endpoint Security Security Operations

Comprehensive and Integrated Security at a Regional Commercial Bank

Isn’t it time to invest in a security solution that doesn’t break the bank? One bank offers a textbook case study in corporate data security, since by definition it’s required to safeguard clients’ highly sensitive personal and financial data. This U.S.-based regional commercial bank has undergone a sea of change ...

Endpoint Security Security Operations

A Brand New McAfee Threat Intelligence Exchange 1.2!

In their recent 2015 Global Business Technographics® Security Survey, Forrester reports that improving threat intelligence capabilities is a top priority for 71% of enterprises. But enterprises don’t need to improve their ability to gather threat intelligence—the abundance of shared intelligence and threat inputs is already overwhelming for security teams. Operationalizing ...

Security Operations

Stop Malware Dead in Its Tracks – 4 Steps to Detect & Eradicate Threats

Nineteen percent of advanced targeted attacks take weeks to discover. Fourteen percent take months to find. And, unfortunately two percent take several years to surface. With undetected attacks lurking around every corner, you need tools that can identify and eradicate threats fast. The State of Detection and Correction Unfortunately, even ...

Subscribe to McAfee Securing Tomorrow Blogs