Ver todas las publicaciones

Filtrar contenido:

Hide English Publications

Why Offense Beats Defense: Misaligned Incentives—a focus on the financial services sector Executive Summary (English)

To better understand this misalignment of incentives, we surveyed 200 IT professionals from the financial services industry, and compared their responses to 600 IT professionals from other global industries.

Busting the Myth of the Malware “Silver Bullet” Executive Summary (English)

Malware threats continue to evolve, and no single “silver bullet” solution can protect you against all of them. Juggling multiple solutions that operate in silos means more time, resources, and complexity for already-strained security teams. It’s time for a smarter approach.

Security Operations in Public Cloud Services: Going with Your Strengths (English)

Aberdeen Group discusses the move to the public cloud and the security shared responsibility model that leverages the strengths of both the public cloud service providers (architecture and infrastructure at scale) and enterprises (applications and data) to provide the enterprise with stronger capabilities than could be achieved going at it alone.

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats (English)

This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.

Groundbreaking Threat Intelligence Advancements from McAfee Labs (English)

McAfee Labs Cloud Intelligence provides a broad set of actionable data to combat adversaries on multiple fronts.

Optimize Cloud threat Intelligence (English)

Learn how McAfee Labs Cloud Intelligence provides a broad set of actionable data to combat adversaries on multiple fronts.

Mastering the Endpoint: Forrester Technology Adoption Profile (English)

Forrester conducted an online survey of 252 IT security decision makers from the US, the UK, France, and Germany, and our findings suggest that organizations are significantly challenged by overly manual security tools and desire connected security solutions that are fast, accurate, and integrated.

Fileless Malware Execution with PowerShell Is Easier than You May Realize (English)

Fileless malware attacks occur by embedding malicious code in scripts or loading malware into memory without writing to disk. With its advanced execution control, the McAfee Application Control whitelisting solution can prevent attacks that bypass file I/O.

McAfee Labs Threats Report: April 2017 (English)

McAfee Labs researchers discuss the background and drivers of threat intelligence sharing. We also examine Mirai, which is notable because it detects and infects poorly secured IoT devices, transforming them into bots to attack its targets.
Temas: Threat Center

Secure IoT Devices to Protect Against Attacks (English)

McAfee explains how to secure IoT devices and how our products can protect systems and networks from IoT device attacks.
Temas: Threat Center