David Bull

David Bull – McAfee Director, Enterprise Solution Marketing
David oversees the messaging, positioning, packaging and pricing of McAfee’s Data Loss Prevention, Cloud Access Security Broker, Encryption, Web, and Email protection technologies, including both SaaS and on-premises form factors. With over 17 years of experience in both enterprise and SMB focused software, David joined McAfee through the acquisition of Secure Computing in 2008, where he held product management and product marketing positions driving the Unified Threat Management (UTM) product line. Prior to McAfee, David spent seven years in the enterprise content management space at Stellent (acquired by Oracle in 2006), serving in the sales, product marketing, and product management groups. David lives in the Denver, CO area and holds a B.S. in engineering from Iowa State University and an MBA from Colorado Christian University.
As you found out from our previous blog, a great deal of data goes out the door through both physical and electronic means. In this blog, we’ll address some of the more sophisticated electronic data exfiltration techniques used by cyberthieves. Many of these bad actors are really smart, innovative people with a lot of time ...
Read Blog
We hope that you’re stoked about expanding your knowledge about data exfiltration. In blog 4, we’re serving up another meaty topic—we’ll be looking at how exactly data walks out the door. Cybercriminals are exploiting the rapidly growing cloud computing trend. Thieves will go where the valuables are, so the cloud is their new frontier, but ...
Read Blog
Welcome to part 3 of our discussion on data exfiltration. Sit down and make yourself comfortable as we get inside the mind of data thieves and explore the types and formats of data that interest them most. Just in case there’s any doubt in your mind, our primary research findings, based on a survey of ...
Read Blog
Welcome to the second episode of our data exfiltration blog series. We’ll be taking a close look at the innocent and not-so-innocent actors who compromise your valuable corporate assets (no, we’re not talking about the Hollywood variety!). We’ll take a look at both external actors and internal actors and show what roles they play in ...
Read Blog
Call it what you will—data loss, data leakage, or data breach—theft of valuable corporate information assets has indisputably become a pervasive global problem. Many security professionals in every sector have had the misfortune of experiencing at least one data breach. According to a recent McAfee study, the security pros we interviewed encountered an average of ...
Read Blog
In the Digital Age, email is second nature. It’s a commonly accepted method of communication, and a convenient one, at that. With convenience, however, comes danger – especially if you’re not even alerted to the bait! This email ‘bait’ I’m referring to comes in the form of phishing scams, which are becoming increasingly abundant as ...
Read Blog
Who has access to my online data? What measures are being taken to protect it? What can I do to make sure it doesn't end up in the wrong hands? The concerns behind these questions are rooted in our desire to maintain control over that which is valuable – a natural instinct. Placing data in the hands ...
Read Blog