View All Publications

Filter Content:

McAfee Labs Threats Report: September 2017

McAfee Labs researchers examine the WannaCry and Petya malware attacks, offer advice to threat hunters searching for indicators of compromise, and dig into script-based malware.
Topics: McAfee Labs

Protecting Against Script-Based Malware

Read our recommended policies and procedures and how our products can protect against script-based code in malware attacks.
Topics: McAfee Labs

Protecting Against WannaCry and Petya

Read our recommended policies and procedures and how McAfee products can protect systems and networks from WannaCry and Petya.
Topics: McAfee Labs

Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security

Overwhelmed by the immense volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate their efforts. Machine learning expands the scope of security analytics from diagnostic and descriptive to prescriptive and proactive, which leads to faster and more accurate detection and improved capabilities to act on threat intelligence today and in the future.

Building Trust in a Cloudy Sky Global Views from Financial Services Organizations

In August 2016, Intel Security surveyed over 2,000 professionals for its annual Cloud Security research study. The 2,009 respondents were drawn from third-party database to represent a diverse set of countries, industries, and organization sizes. After screening out those who were not using cloud services or not directly involved in decision making for cloud security initiatives, 1,400 senior technical professionals completed the study. This executive summary shares the results of the 240 enterprise Financial Services organizations surveyed and offers a understanding of the current state of cloud adoption and security by industry

Building Trust in a Cloudy Sky Executive Summary

In August 2016, Intel Security surveyed over 2,000 professionals for its annual Cloud Security research study. The 2,009 respondents were drawn from third-party database to represent a diverse set of countries, industries, and organization sizes. After screening out those who were not using cloud services or not directly involved in decision making for cloud security initiatives, 1,400 senior technical professionals completed the study. This executive summary of the full cloud security report provides a brief overview of key findings, conclusions and recommendations.

Building Trust in a Cloudy Sky Global views from the IT C-Suite

CIOs and CISOs are leading the way to cloud adoption. Trust in public cloud outweighs their trust in private cloud and most have a adopted a Cloud First stance with their application and service deployments. This executive summary dives into the CIO/CISO perspectives as compared to IT staff gathered from the Building Trust in a Cloudy Sky report.

Mastering Modern Endpoint Protection Guide

This guide walks through six step to better endpoint protection drawing on research cited in the to the 2017 Forrester report, Mastering the Endpoint.

No Signature Required: The Power of Emulation in Preventing Malware

This white paper discusses the flagship McAfee Gateway Anti-Malware technology, how it adapts to new threats, and sets the stage to protect against future threats with a modular design that allows for the easy addition of components for maximum flexibility.

Not Today Zero-Day: Block Zero-Day Threats Before They Hit Endpoints

This whitepaper provides data points on malware and stresses the importance on emulation, which reduces "firefighting" and dramatically lowers security costs and freeing up resources for more strategic initiatives such as endpoint detection and response.