{"id":124835,"date":"2021-07-16T13:15:22","date_gmt":"2021-07-16T20:15:22","guid":{"rendered":"\/blogs\/?p=124835"},"modified":"2025-05-27T20:14:19","modified_gmt":"2025-05-28T03:14:19","slug":"an-overall-philosophy-on-the-use-of-critical-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/","title":{"rendered":"An Overall Philosophy on the Use of Critical Threat Intelligence"},"content":{"rendered":"<p>The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task and purpose.\u00a0\u00a0 You never can exactly tell how they will come at you, but come they will.\u00a0 It\u2019s no different than fighting a kinetic foe in that, before you fight, you must choose your ground and study your enemy\u2019s tendencies.<\/p>\n<p>A lot of focus has been placed on tools and updating technology, but often we are pushed back on our heels and find ourselves fighting a defensive action.<\/p>\n<p>But what if we change?\u00a0 How do we do that?<\/p>\n<p>The first step is to study the battlefield, understand what you\u2019re trying to protect and lay down your protection strategy.\u00a0 Pretty basic right??<\/p>\n<p>Your technology strategy is very important, but you must embrace and create a thorough Cyber Threat Intelligence (CTI) doctrine which must take on many forms.<\/p>\n<p>First, there is data, and lots of it.\u00a0 However, the data must take specific forms to research and detect nascent elements where the adversary is attempting to catch you napping or give you the perception that the activity you see is normal.<\/p>\n<p>As you pool this data, it must be segmented into layers and literally mapped to geographic locations across the globe.\u00a0 The data is classified distinctly as malicious and reputations are applied.\u00a0 This is a vital step in that it enables analytical programs, along with human intelligence analysts to apply the data within intelligence reports which themselves can take on many forms.<\/p>\n<p>Once the data takes an analytic form, then it allows organizations to forensically piece together a picture of an attack.\u00a0 This process is painstakingly tedious but necessary to understand your enemy and his tendencies.\u00a0 Tools are useful, but it\u2019s always the human in the loop that will recognize the tactical and strategic implications of an adversary\u2019s moves. Once you see the picture, it becomes real, and then you\u2019re able to prepare your enterprise for the conflict that follows.<\/p>\n<p>Your early warning and sensing strategy must incorporate this philosophy.\u00a0 You must sense, collect, exploit, process, produce and utilize each intelligence product that renders useful information.\u00a0 It\u2019s this process that will enable any organization to move decisively to and stay \u201cleft of boom\u201d.<\/p>\n<p>The McAfee Advanced Programs Group (APG) was created eight years ago to support intelligence organizations that embrace and maintain a strong CTI stance.\u00a0 Its philosophy is to blend people, processes, data and a strong intelligence heritage to enable our customers to understand the cyber battlefield to proactively protect, but \u201cmaneuver\u201d when necessary to avoid an attack.<\/p>\n<h2>APG Key Disciplines<\/h2>\n<p>APG applies three key disciplines or mission areas to provide this support.<\/p>\n<p>First, we developed an internal tool called the Advanced Threat Landscape Analysis System (ATLAS).\u00a0 This enables our organization to apply our malicious threat detections to a geospatial map display to see where we\u2019re seeing malicious data.\u00a0 ATLAS draws from our global network of billions of threat sensors to see trillions of detections each day, but enables our analysts to concentrate on the most malicious activity.\u00a0 Then we\u2019re better able to research and report accurate threat landscape information.<\/p>\n<p>The second leg in the stool is our analytical staff, the true cyber ninjas that apply decades of experience supporting HUMINT operations across the globe and a well-established intelligence-based targeting philosophy to the cyber environment.\u00a0 The result is a true understanding of the cyber battlefield enabling the leadership to make solid \u201cintelligence-based\u201d decisions.<\/p>\n<p>Finally, the third leg is our ability to develop custom solutions and interfaces to adapt in a very custom way our ability to see and study data.\u00a0 We have the ability to leverage 2.8 billion malicious detections, along with 20 other distinct malicious feeds, to correlate many different views, just not the McAfee view.\u00a0 We interpret agnostically.<\/p>\n<p>These three legs provide APG a powerful CTI advantage allowing our customers to adapt and respond to events by producing threat intelligence dynamically. When using this service it allows the customer to be fully situationally aware in a moments notice (visual command and control). Access to the data alone is an immense asset to any organization.\u00a0 This allows each customer not only to know what their telemetry is, but also provides real time insights into the entire world ecosystem. Finally, the human analysis alone is immensely valuable.\u00a0 It allows for the organizations to read and see\/understand what it all means (the who, what, where and why).\u00a0\u00a0 \u201cThe so what!!\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task and&#8230;<\/p>\n","protected":false},"author":802,"featured_media":124838,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4618],"class_list":["post-124835","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>An Overall Philosophy on the Use of Critical Threat Intelligence | McAfee Blog<\/title>\n<meta name=\"description\" content=\"The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task and purpose.\u00a0\u00a0 You\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An Overall Philosophy on the Use of Critical Threat Intelligence | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task and purpose.\u00a0\u00a0 You\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-16T20:15:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T03:14:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"424\" \/>\n\t<meta property=\"og:image:height\" content=\"238\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Patrick Flynn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@flynnpartyof5\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick Flynn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/\"},\"author\":{\"name\":\"Patrick Flynn\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e5f3bcd4e5f40ce8a86db3115047de03\"},\"headline\":\"An Overall Philosophy on the Use of Critical Threat Intelligence\",\"datePublished\":\"2021-07-16T20:15:22+00:00\",\"dateModified\":\"2025-05-28T03:14:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/\"},\"wordCount\":754,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1-2.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/\",\"name\":\"An Overall Philosophy on the Use of Critical Threat Intelligence | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1-2.png\",\"datePublished\":\"2021-07-16T20:15:22+00:00\",\"dateModified\":\"2025-05-28T03:14:19+00:00\",\"description\":\"The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task and purpose.\u00a0\u00a0 You\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1-2.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1-2.png\",\"width\":424,\"height\":238},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"An Overall Philosophy on the Use of Critical Threat Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e5f3bcd4e5f40ce8a86db3115047de03\",\"name\":\"Patrick Flynn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/8407022883bf49c802754371d6aa58f6\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Patrick-Flynn-96x96.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Patrick-Flynn-96x96.jpeg\",\"caption\":\"Patrick Flynn\"},\"description\":\"Patrick Flynn is a public sector security expert with more than 27 years' experience in the federal government and private sector. Flynn is currently Head, McAfee Advanced Programs Group, and previously served in similar roles at Northrop Grumman and General Dynamics. Flynn's public sector experience includes work at the U.S. Department of Homeland Security as the Director of Communications of the Joint Wireless Program Office. He also served as Assistant Chief of the CBP Office of Border Patrol. Prior to that role he served as a U.S. Border Patrol Agent. Flynn is retired from the U.S. Naval Reserve, Office of Naval Intelligence, and was awarded a Bronze Star for his service in Operation Enduring Freedom in Afghanistan. He formally, served on the both President Obama and Trump\u2019s National Security Telecommunications Advisory Council. Flynn holds a B.S. in the Administration of Criminal Justice.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/patrick-flynn-71a23a1\/\",\"https:\/\/x.com\/flynnpartyof5\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/patrick-flynn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An Overall Philosophy on the Use of Critical Threat Intelligence | McAfee Blog","description":"The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task and purpose.\u00a0\u00a0 You","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"An Overall Philosophy on the Use of Critical Threat Intelligence | McAfee Blog","og_description":"The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task and purpose.\u00a0\u00a0 You","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2021-07-16T20:15:22+00:00","article_modified_time":"2025-05-28T03:14:19+00:00","og_image":[{"width":424,"height":238,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1-2.png","type":"image\/png"}],"author":"Patrick Flynn","twitter_card":"summary_large_image","twitter_creator":"@flynnpartyof5","twitter_site":"@McAfee","twitter_misc":{"Written by":"Patrick Flynn","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/"},"author":{"name":"Patrick Flynn","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e5f3bcd4e5f40ce8a86db3115047de03"},"headline":"An Overall Philosophy on the Use of Critical Threat Intelligence","datePublished":"2021-07-16T20:15:22+00:00","dateModified":"2025-05-28T03:14:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/"},"wordCount":754,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1-2.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/","name":"An Overall Philosophy on the Use of Critical Threat Intelligence | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1-2.png","datePublished":"2021-07-16T20:15:22+00:00","dateModified":"2025-05-28T03:14:19+00:00","description":"The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task and purpose.\u00a0\u00a0 You","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1-2.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1-2.png","width":424,"height":238},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/an-overall-philosophy-on-the-use-of-critical-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"An Overall Philosophy on the Use of Critical Threat Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e5f3bcd4e5f40ce8a86db3115047de03","name":"Patrick Flynn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/8407022883bf49c802754371d6aa58f6","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Patrick-Flynn-96x96.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Patrick-Flynn-96x96.jpeg","caption":"Patrick Flynn"},"description":"Patrick Flynn is a public sector security expert with more than 27 years' experience in the federal government and private sector. Flynn is currently Head, McAfee Advanced Programs Group, and previously served in similar roles at Northrop Grumman and General Dynamics. Flynn's public sector experience includes work at the U.S. Department of Homeland Security as the Director of Communications of the Joint Wireless Program Office. He also served as Assistant Chief of the CBP Office of Border Patrol. Prior to that role he served as a U.S. Border Patrol Agent. Flynn is retired from the U.S. Naval Reserve, Office of Naval Intelligence, and was awarded a Bronze Star for his service in Operation Enduring Freedom in Afghanistan. He formally, served on the both President Obama and Trump\u2019s National Security Telecommunications Advisory Council. Flynn holds a B.S. in the Administration of Criminal Justice.","sameAs":["https:\/\/www.linkedin.com\/in\/patrick-flynn-71a23a1\/","https:\/\/x.com\/flynnpartyof5"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/patrick-flynn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/124835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/802"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=124835"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/124835\/revisions"}],"predecessor-version":[{"id":214494,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/124835\/revisions\/214494"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/124838"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=124835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=124835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=124835"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=124835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}