An Unmatched Customer Experience
I’ve been in this industry for over twenty years, and the advancements in cybersecurity over the last few years are unmatched. As an industry, we went from believing in a best-in-breed, siloed approach and now we understand our customers need a connected security architecture that can protect, detect, and correct. ...
Pervasive Data Protection: Kick the Quick-Fix & Go for a Unified Defense
This blog was written by Ben Cody. The cloud is here to stay—and no one in the enterprise playing field would argue that point. Cloud adoption across nearly every business unit is a reality that CISOs have fully accepted. Now the big uphill battle for security professionals is how to ...
Cómo Ayuda Threat Intelligence Exchange a Ahorrar Dinero y Salvar Vidas
Para Kirk Davis, Director de Seguridad de la Información en Vidant Health, los días de trabajo complejos siempre se acompañan de eventos de seguridad. Uno de esos días sucedió, cuando la compañía de cuidado de la salud de Carolina del Norte fue atacada con el Troyano Cryptowall, que fue capaz ...
Compartir Inteligencia Sobre Amenazas Contra la Seguridad Cibernética
La seguridad cibernética es un deporte que se juega en equipo. Los maleantes comparten información, habilidades y código cuando se ayudan unos a otros. Las personas honestas hacen la misma cosa para mantenerse al ritmo. Compartir inteligencia de amenazas es un aspecto clave en el que los conocimientos adquiridos por ...
Dynamic Endpoint – some things are simply better together!
This blog was written by Candace Worley, McAfee’s former Vice President and Chief Technical Strategist. I like chocolate but I don’t seek it out. Peanut butter – I can take it or leave it. But put them together and now you’ve got my attention. Some things are better together. That ...
Cuatro maneras de evitar que el ransomware se ejecute en sus servidores
Los nuevos ransomware de servidores como el caso de SamSam y Maktub están a la caza de víctimas. A diferencia de las antiguas técnicas de ransomware, ahora éste se instala sin acciones determinadas como hacer clic en un enlace o abrir un archivo. En lugar de eso, el ransomware ataca ...
Comprehensive and Integrated Security at a Regional Commercial Bank
Isn’t it time to invest in a security solution that doesn’t break the bank? One bank offers a textbook case study in corporate data security, since by definition it’s required to safeguard clients’ highly sensitive personal and financial data. This U.S.-based regional commercial bank has undergone a sea of change ...
A Brand New McAfee Threat Intelligence Exchange 1.2!
In their recent 2015 Global Business Technographics® Security Survey, Forrester reports that improving threat intelligence capabilities is a top priority for 71% of enterprises. But enterprises don’t need to improve their ability to gather threat intelligence—the abundance of shared intelligence and threat inputs is already overwhelming for security teams. Operationalizing ...
Stop Malware Dead in Its Tracks – 4 Steps to Detect & Eradicate Threats
Nineteen percent of advanced targeted attacks take weeks to discover. Fourteen percent take months to find. And, unfortunately two percent take several years to surface. With undetected attacks lurking around every corner, you need tools that can identify and eradicate threats fast. The State of Detection and Correction Unfortunately, even ...