{"id":43179,"date":"2015-05-06T09:44:34","date_gmt":"2015-05-06T16:44:34","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=43179"},"modified":"2025-08-31T22:47:12","modified_gmt":"2025-09-01T05:47:12","slug":"moores-law-security","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/","title":{"rendered":"Moore\u2019s Law and Security"},"content":{"rendered":"<p>In case you haven\u2019t noticed, you owe Moore\u2019s Law a belated birthday card. The famed theorem, which set the technology industry\u2019s evolutionary pace by positing that computational power would double every year, turned 50 this year.<\/p>\n<p>We in the technology industry owe a lot to Moore\u2019s Law, as it\u2019s given us the foundation on which to build new technologies, applications, processes, and companies. Fortunes are owed to McAfee co-founder Gordon Moore, whose law has set expectations for what\u2019s to come and when. As a result, we\u2019ve been able to accurately predict the evolutionary steps in computational performance and capabilities.<\/p>\n<p>While we all owe much to Moore\u2019s Law, it\u2019s admittedly a bit of a double-edged sword. The observation has led to more powerful computers and data centers, and it\u2019s made technologies such as mobile and cloud computing possible, but it\u2019s also created new and more potent cyberattacks and enabled hackers to target systems with increasing effectiveness.<\/p>\n<p>For McAfee and our partners, Moore\u2019s Law is a catalyst. The steady, predictable increase in computational power will always bring new applications \u2013 hardware, software, and cloud \u2013 that come with vulnerabilities. The technology industry has yet to create an impenetrable operating system, application, or infrastructure. It\u2019s incumbent on security practitioners and professionals to stay current with new technologies, understand security measures, and convey that to end users.<\/p>\n<h2>A Message to Security Providers<\/h2>\n<p>Here are the things that security solution providers should do:<\/p>\n<ol>\n<li><strong>Stay Current.<\/strong> Even if you\u2019re not adopting or reselling new and emerging technologies, it\u2019s a good idea to keep pace on what\u2019s being developed and coming out. Your customers will have questions about new applications. It\u2019s best to have a working knowledge of new technologies so you can engage in conversation.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li><strong>Monitor Customer Technology Adoption.<\/strong> The best way to address a customer\u2019s evolving security needs is to monitor the technologies they\u2019re adopting. The addition of new technologies and resources to their IT fabric is an opportunity to engage in a dialog about security and demonstrate value by proactively moving to protect their investments.<\/li>\n<\/ol>\n<ol start=\"3\">\n<li><strong>Plan with Customers.<\/strong> Beyond just reacting to customer\u2019s technology adoption, it\u2019s a good idea to remain persistently engaged with customers and plan for their security needs. This helps you maintain relevancy and enables you to act as their trusted advisor. By adopting new technology, customers incur both costs and risks, and planning is a means of mitigating that risk before anything is actually purchased.<\/li>\n<\/ol>\n<p>The question comes up periodically: When will Moore\u2019s Law reach its limit? When will the pace of computational evolution slow or stop? The answer: Not for the foreseeable future, and that means we security folks need to keep pace or risk becoming obsolete.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In case you haven\u2019t noticed, you owe Moore\u2019s Law a belated birthday card. The famed theorem, which set the technology&#8230;<\/p>\n","protected":false},"author":674,"featured_media":162354,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,8050],"tags":[3949,3939],"coauthors":[3973],"class_list":["post-43179","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-mcafee-news","tag-cybersafety","tag-mcafee-partners1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Moore\u2019s Law and Security | McAfee Blog<\/title>\n<meta name=\"description\" content=\"In case you haven\u2019t noticed, you owe Moore\u2019s Law a belated birthday card. The famed theorem, which set the technology industry\u2019s evolutionary pace by\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Moore\u2019s Law and Security | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"In case you haven\u2019t noticed, you owe Moore\u2019s Law a belated birthday card. The famed theorem, which set the technology industry\u2019s evolutionary pace by\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-05-06T16:44:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T05:47:12+00:00\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Moore\u2019s Law and Security\",\"datePublished\":\"2015-05-06T16:44:34+00:00\",\"dateModified\":\"2025-09-01T05:47:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/\"},\"wordCount\":472,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/622x308_Blog_FakeSecurityApp.png\",\"keywords\":[\"cybersafety\",\"McAfee partners\"],\"articleSection\":[\"Internet Security\",\"McAfee News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/\",\"name\":\"Moore\u2019s Law and Security | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/622x308_Blog_FakeSecurityApp.png\",\"datePublished\":\"2015-05-06T16:44:34+00:00\",\"dateModified\":\"2025-09-01T05:47:12+00:00\",\"description\":\"In case you haven\u2019t noticed, you owe Moore\u2019s Law a belated birthday card. The famed theorem, which set the technology industry\u2019s evolutionary pace by\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/622x308_Blog_FakeSecurityApp.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/622x308_Blog_FakeSecurityApp.png\",\"width\":622,\"height\":308},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Moore\u2019s Law and Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Moore\u2019s Law and Security | McAfee Blog","description":"In case you haven\u2019t noticed, you owe Moore\u2019s Law a belated birthday card. The famed theorem, which set the technology industry\u2019s evolutionary pace by","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Moore\u2019s Law and Security | McAfee Blog","og_description":"In case you haven\u2019t noticed, you owe Moore\u2019s Law a belated birthday card. The famed theorem, which set the technology industry\u2019s evolutionary pace by","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-05-06T16:44:34+00:00","article_modified_time":"2025-09-01T05:47:12+00:00","author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Moore\u2019s Law and Security","datePublished":"2015-05-06T16:44:34+00:00","dateModified":"2025-09-01T05:47:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/"},"wordCount":472,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/622x308_Blog_FakeSecurityApp.png","keywords":["cybersafety","McAfee partners"],"articleSection":["Internet Security","McAfee News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/","name":"Moore\u2019s Law and Security | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/622x308_Blog_FakeSecurityApp.png","datePublished":"2015-05-06T16:44:34+00:00","dateModified":"2025-09-01T05:47:12+00:00","description":"In case you haven\u2019t noticed, you owe Moore\u2019s Law a belated birthday card. The famed theorem, which set the technology industry\u2019s evolutionary pace by","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/622x308_Blog_FakeSecurityApp.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/622x308_Blog_FakeSecurityApp.png","width":622,"height":308},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/moores-law-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Moore\u2019s Law and Security"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/43179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=43179"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/43179\/revisions"}],"predecessor-version":[{"id":213738,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/43179\/revisions\/213738"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/162354"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=43179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=43179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=43179"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=43179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}