{"id":93244,"date":"2018-12-17T14:49:28","date_gmt":"2018-12-17T22:49:28","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=93244"},"modified":"2025-08-30T02:51:22","modified_gmt":"2025-08-30T09:51:22","slug":"ghosts-of-botnets-past-present-and-future","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/","title":{"rendered":"Ghosts of Botnets Past, Present, and Future"},"content":{"rendered":"<p>\u2018Twas the morning of October 21st, and all through the house many IoT devices were stirring, including a connected mouse. Of course, this wasn\u2019t <a href=\"https:\/\/www.poetryfoundation.org\/poems\/43171\/a-visit-from-st-nicholas\" target=\"_blank\" rel=\"noopener\">the night before Christmas<\/a>, but rather the morning of Dyn \u2014 the 2016 DDoS attack on the service provider that took the entire East Coast offline for a few hours. The root of the attack: <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/what-is-botnet\/\" target=\"_blank\" rel=\"noopener\">botnets<\/a>, AKA unsecured IoT devices that were enslaved by Mirai malware. And though this attack made history back in 2016, botnet attacks and the manipulation of vulnerable IoT devices have shown no signs of slowing since. To explore how these attacks have evolved over time, let\u2019s examine the past, present, and future of botnets.<\/p>\n<h2><strong>The Past<\/strong><\/h2>\n<p>Any internet-connected device could potentially become a botnet. <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/botnet\" target=\"_blank\" rel=\"noopener\">A botnet<\/a> is an aggregation of connected devices, which could include computers, mobile devices, IoT devices, and more that have been infected and thereby under the control of one malware variant. The owners of these devices are typically unaware their technology has been infected and thereby under the control of the malware author.<\/p>\n<p>This infection and enslavement process came to a powerful fruition on that <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/iot-devices-ddos-attack\/\" target=\"_blank\" rel=\"noopener\">fateful October morning<\/a>, as thousands of devices were manipulated by Mirai malware and transformed into botnets for cybercriminals\u2019 malicious scheme. Cybercriminals used this botnet army to construct one of the <a href=\"https:\/\/www.forbes.com\/sites\/davelewis\/2017\/10\/23\/the-ddos-attack-against-dyn-one-year-later\/#2e4039a51ae9\" target=\"_blank\" rel=\"noopener\">largest DDoS attacks<\/a> in recent history on DNS provider Dyn, which temporarily knocked major sites such as Twitter, Github, and Etsy offline.<\/p>\n<h2><strong>The Present<\/strong><\/h2>\n<p>Now, the Dyn attack is arguably one of the most infamous in all of security history. But that doesn\u2019t mean the attacks stop there. Fast forward to 2018, and <a href=\"https:\/\/www.darkreading.com\/perimeter\/iot-botnets-by-the-numbers\/d\/d-id\/1330924?image_number=8\" target=\"_blank\" rel=\"noopener\">botnets are still just as prominent, if not more<\/a>. Earlier in the year, we saw <a href=\"https:\/\/securingtomorrow.mcafee.com\/business\/satori-botnet-turns-iot-devices-zombies-borrowing-code-mirai\/\" target=\"_blank\" rel=\"noopener\">Satori<\/a> emerge, which even borrowed code from Mirai, as well as Hide N Seek (HNS), which has managed to build itself up to 24,000 bots since January 10th.<\/p>\n<p>What\u2019s more \u2014 DDoS attacks, which are largely driven by botnets, have also <a href=\"https:\/\/www.eweek.com\/security\/how-ddos-attacks-techniques-have-evolved-over-past-20-years\" target=\"_blank\" rel=\"noopener\">showed no signs of slowing<\/a> this year. Just take the recent <a href=\"https:\/\/www.zdnet.com\/article\/a-botnet-of-over-20000-wordpress-sites-is-attacking-other-wordpress-sites\/\" target=\"_blank\" rel=\"noopener\">WordPress attack<\/a> for example, which actually involved an army of over 20,000 botnets attacking sites across the web.<\/p>\n<h2><strong>The Future<\/strong><\/h2>\n<p>Botnets don\u2019t just have a past and present \u2014 they likely have a future as well. That\u2019s because cybercriminals favor the potency of this \u2018infect and enslave\u2019 tactic, so much so that they\u2019re trying to spread it far and wide. Turns out, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/you-can-now-rent-a-mirai-botnet-of-400-000-bots\/\" target=\"_blank\" rel=\"noopener\">according to one report<\/a>, you can even rent an IoT botnet, as one Dark Web advertisement displayed a 50,000-device botnet for rent for a two-week duration to conduct one-hour attacks a rate of $3000 &#8211; $4000.<\/p>\n<p>The good news is \u2014 the cybersecurity industry is preparing for the future of botnet attacks as well. In fact, we\u2019ve engineered technology designed to fight back against the nature of insecure IoT devices \u2014 such as our <a href=\"https:\/\/home.mcafee.com\/root\/campaign.aspx?cid=223304\" target=\"_blank\" rel=\"noopener\">Secure Home Platform solution<\/a>.<\/p>\n<p>However, a lot of the botnet attacks can be stopped by users themselves if they implement strong security practices from start. This means changing the default passwords on any new IoT device you get, keeping any and all software up-to-date, always using a <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/family-safety\/what-is-a-firewall\/\" target=\"_blank\" rel=\"noopener\">firewall<\/a> to detect unusual behavior, and implementing comprehensive security software to ensure that all your computers and devices have protection.<\/p>\n<p>If users everywhere implement the right processes and products from the start, botnet attacks may eventually become a thing of the past, and won\u2019t ever be part of the present again.<\/p>\n<p>To learn more about IoT device security and our approach to it, be sure to follow us at <a href=\"https:\/\/twitter.com\/McAfee\" target=\"_blank\" rel=\"noopener\">@McAfee<\/a> and <a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u2018Twas the morning of October 21st, and all through the house many IoT devices were stirring, including a connected mouse&#8230;.<\/p>\n","protected":false},"author":1040,"featured_media":92351,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661],"tags":[49,4131],"coauthors":[5587],"class_list":["post-93244","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","tag-botnet","tag-internet-of-things"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ghosts of Botnets Past, Present, and Future | McAfee Blog<\/title>\n<meta name=\"description\" content=\"\u2018Twas the morning of October 21st, and all through the house many IoT devices were stirring, including a connected mouse. Of course, this wasn\u2019t the night\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ghosts of Botnets Past, Present, and Future | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"\u2018Twas the morning of October 21st, and all through the house many IoT devices were stirring, including a connected mouse. Of course, this wasn\u2019t the night\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-17T22:49:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-30T09:51:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/img_1615772217992915.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Shailaja Shankar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shailaja Shankar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/\"},\"author\":{\"name\":\"Shailaja Shankar\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f583cc591401f92521b5efd0542e5d5\"},\"headline\":\"Ghosts of Botnets Past, Present, and Future\",\"datePublished\":\"2018-12-17T22:49:28+00:00\",\"dateModified\":\"2025-08-30T09:51:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/\"},\"wordCount\":598,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/img_1615772217992915.jpg\",\"keywords\":[\"botnet\",\"Internet of Things\"],\"articleSection\":[\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/\",\"name\":\"Ghosts of Botnets Past, Present, and Future | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/img_1615772217992915.jpg\",\"datePublished\":\"2018-12-17T22:49:28+00:00\",\"dateModified\":\"2025-08-30T09:51:22+00:00\",\"description\":\"\u2018Twas the morning of October 21st, and all through the house many IoT devices were stirring, including a connected mouse. Of course, this wasn\u2019t the night\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/img_1615772217992915.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/img_1615772217992915.jpg\",\"width\":1920,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ghosts of Botnets Past, Present, and Future\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f583cc591401f92521b5efd0542e5d5\",\"name\":\"Shailaja Shankar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/2abe5e56865d1e1f7e90f294b861ea26\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/05\/Shaila-Shankar_Headshot-2020-e1621276254455-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/05\/Shaila-Shankar_Headshot-2020-e1621276254455-96x96.jpg\",\"caption\":\"Shailaja Shankar\"},\"description\":\"A seasoned technology and business executive with extensive experience building world class teams and best of breed software products. Shailaja has led global engineering teams delivering cloud-enabled security software solutions to &gt;500 million users. A passionate leader with a proven track record for launching innovative and first-to-market security solutions across consumer, SMB and enterprise segments. Most recently, as the General Manager of WW Mobile and ISP Business Unit, Shailaja lead the consumer IoT and connected home security strategy and execution leading a cross-functional team working with ISPs, Telcos, MVNOs and Router OEMs. Currently, Shailaja is responsible for security and threat defense solutions across endpoint platforms (ENS and EDR), eXtended detection and response platform (MVision XDR), data center security, and Cloud Native Application Protection Platform (MVision CNAPP).\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/shailaja-k-shankar-17740b1\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/shaila-shankar\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ghosts of Botnets Past, Present, and Future | McAfee Blog","description":"\u2018Twas the morning of October 21st, and all through the house many IoT devices were stirring, including a connected mouse. Of course, this wasn\u2019t the night","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Ghosts of Botnets Past, Present, and Future | McAfee Blog","og_description":"\u2018Twas the morning of October 21st, and all through the house many IoT devices were stirring, including a connected mouse. Of course, this wasn\u2019t the night","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-12-17T22:49:28+00:00","article_modified_time":"2025-08-30T09:51:22+00:00","og_image":[{"width":1920,"height":500,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/img_1615772217992915.jpg","type":"image\/jpeg"}],"author":"Shailaja Shankar","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Shailaja Shankar","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/"},"author":{"name":"Shailaja Shankar","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f583cc591401f92521b5efd0542e5d5"},"headline":"Ghosts of Botnets Past, Present, and Future","datePublished":"2018-12-17T22:49:28+00:00","dateModified":"2025-08-30T09:51:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/"},"wordCount":598,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/img_1615772217992915.jpg","keywords":["botnet","Internet of Things"],"articleSection":["Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/","name":"Ghosts of Botnets Past, Present, and Future | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/img_1615772217992915.jpg","datePublished":"2018-12-17T22:49:28+00:00","dateModified":"2025-08-30T09:51:22+00:00","description":"\u2018Twas the morning of October 21st, and all through the house many IoT devices were stirring, including a connected mouse. Of course, this wasn\u2019t the night","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/img_1615772217992915.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/img_1615772217992915.jpg","width":1920,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ghosts-of-botnets-past-present-and-future\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Ghosts of Botnets Past, Present, and Future"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f583cc591401f92521b5efd0542e5d5","name":"Shailaja Shankar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/2abe5e56865d1e1f7e90f294b861ea26","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/05\/Shaila-Shankar_Headshot-2020-e1621276254455-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/05\/Shaila-Shankar_Headshot-2020-e1621276254455-96x96.jpg","caption":"Shailaja Shankar"},"description":"A seasoned technology and business executive with extensive experience building world class teams and best of breed software products. Shailaja has led global engineering teams delivering cloud-enabled security software solutions to &gt;500 million users. A passionate leader with a proven track record for launching innovative and first-to-market security solutions across consumer, SMB and enterprise segments. Most recently, as the General Manager of WW Mobile and ISP Business Unit, Shailaja lead the consumer IoT and connected home security strategy and execution leading a cross-functional team working with ISPs, Telcos, MVNOs and Router OEMs. Currently, Shailaja is responsible for security and threat defense solutions across endpoint platforms (ENS and EDR), eXtended detection and response platform (MVision XDR), data center security, and Cloud Native Application Protection Platform (MVision CNAPP).","sameAs":["https:\/\/www.linkedin.com\/in\/shailaja-k-shankar-17740b1\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/shaila-shankar\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/93244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1040"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=93244"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/93244\/revisions"}],"predecessor-version":[{"id":221644,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/93244\/revisions\/221644"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/92351"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=93244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=93244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=93244"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=93244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}