Business

Data Exfiltration, Part 2: Who’s After Your Data?

Welcome to the second episode of our data exfiltration blog series. We’ll be taking a close look at the innocent and not-so-innocent actors who compromise your valuable corporate assets (no, we’re not talking about the Hollywood variety!). We’ll take a look at both external actors and internal actors and show what roles they play in …

Business

Data Exfiltration: The Who, What, Why, Where, and How

Call it what you will—data loss, data leakage, or data breach—theft of valuable corporate information assets has indisputably become a pervasive global problem. Many security professionals in every sector have had the misfortune of experiencing at least one data breach. According to a recent Intel Security study, the security pros we interviewed encountered an average …

Security Connected

Is Your Data Phishing Bait for Hackers?

Data makes the world go round. Without data we wouldn’t be able to successfully run our companies, gain customer insights, increase profits, and continue to innovate. In a world of hackers who are always on the prowl, however, data has the potential to turn from gold to kryptonite. When data falls into the wrong hands …

Security Connected

Shadow IT and the Future of the Cloud: How CISOs Lost Visibility and How They Can Regain It

If there’s one term that can make a CISO squirm whenever mentioned, it’s “Shadow IT.” After all, when tasked with securing an enterprise-scale network, most CISOs frown on business units and employees procuring their own tech solutions — like Dropbox, Flickr, or Gmail — without notifying IT for proper vetting. But that discomfort isn’t stopping …

Security Connected

Embrace and Secure Shadow IT

“Shadow IT” is stepping out into the light of day. Business users are eagerly embracing the cloud and especially Software-as-a-Service (SaaS) in search of cost-effective productivity tools for file sharing and storage, collaboration, social media, and anything else that makes them more effective on the job. But the problem is these well-intentioned, hardworking employees are …

Security Connected

The Two Faces of Your Favorite Apps

Online applications have taken over a significant portion of our lives, for better or worse. We spend time in browsers and mobile apps, both for leisure and productivity on a daily basis. Think about the last time you watched a video on YouTube. Was it last week, yesterday, or 15 minutes ago? Cloud-based storage and …

Security Connected

Clicking Without Thinking

We feel safe checking our email anytime, anywhere. But should we? As cybercriminals find their way into every nook and cranny of our online activity, it’s important to evaluate our inbox’s security – on every device. Throughout the globe, more people are accessing email via smartphone than ever before. In the United States alone, 75% …

Security Connected

Securing Cloud Applications – Analysts Weigh In

From July 29 to August 1st, technology research firm Gartner hosted their annual Catalyst conference, an event focused on topics ranging from identity and access management, to mobile devices and cloud computing, all aimed at the IT professional. While at the conference, I had a chance to attend several excellent sessions with in-depth technical focus. …

Security Connected

How not to get hacked: Stop email-borne threats!

Cyber-attacks making headlines these days have resulted in embarrassing tweets, website defacement, and even theft of intellectual property. What’s the common thread in many of these events? Often, the inbox of an innocent employee. Whether it’s a low-tech phishing attack or embedded links leading to advanced malware, email still remains the most vulnerable and direct …

Business

Bundle Up in the Cloud – A Layered Security Approach

The product teams here at McAfee work tirelessly to provide our customers with the best security technology available to minimize risk and enable their businesses to operate in a digital environment where new threats and vulnerabilities appear each day. We’re constantly looking at how organizations are operating in the evolving technology landscape, tailoring our products …