Business

Brazilian Educational Organization Gets High Marks for Innovation Leadership with Integrated Security from McAfee

Furthering the cause of education in Brazil is the mission that fuels SOMOS Educação’s laser-focused drive toward technology and innovation—and McAfee is playing a pivotal role in that transformation. As CIO Juliano Pereira points out, “Compared to 99% of the educational organizations in Brazil, we are way ahead of the game”—and, in large part, it’s …

Cloud Security

Finals Week: Cloud Edition

It’s almost summertime—where the nights are longer and the water is warmer! Before we head to the beach it’s time to review all the things we learned about the cloud from the past two quarters. For #CloudFinalsWeek we’re asking you to prove your knowledge on the current climate of cloud computing and security. Will you …

Cloud Security

Enriching Cloud Threat Intelligence and Visibility – Cloud Workload Security and AWS GuardDuty

This blog was written by Stan Golubchik. Using cloud-native threat intelligence to enhance workload security Risk assessment is crucial in today’s public cloud. In Amazon Web Services (AWS), native monitoring services for ingress and egress network data can shed light on potential network threats and anomalies. A service of AWS, GuardDuty, bridges the capability to …

Business

McAfee vNSP and AWS Are Winning Combination for Enterprise and Federal Customers

Fun Facts: ECS stood up and managed the first security operations center at the White House. Today, ECS manages the world’s largest McAfee installation—employing just about every solution we make—for the U.S. Army. ECS is more than a McAfee Platinum Partner: they’ve built their entire security solution around McAfee products. The company’s unique offering to …

Cloud Security

Cloud Protection Moves Into a New Phase

This blog post was written by Sandy Orlando. It’s RSA Conference season and a great time to talk about containers and security. No, not traditional shipping containers. Containers have become developers’ preferred deployment model for modern cloud applications, helping organizations accelerate innovation and differentiate themselves in the marketplace. This is part of the natural progression …

Business

RSA Influencers Identify Cybersecurity’s Top Issues

More interest, more news, and more money are swirling through the cybersecurity industry than perhaps ever before. Data breaches make headlines, shape elections, and lead to Congressional hearings. Artificial intelligence tools wow the public and stretch the limits of the imagination. And the 40,000 RSA Conference attendees pouring into San Francisco are not impressed. Cybersecurity …

Business

A Guide to McAfee at RSA 2018

As the RSA Conference convenes more than 40,000 April 16-19 at Moscone Center in San Francisco, cybersecurity has perhaps never been so vital, diverse, and wide-ranging. To help make sense of that, McAfee speakers at RSA will look back at influences that shaped this world, ahead to new innovations and management approaches, and deeply into …

Business

A New Standard for Security at New Standard Corporation

From the latches on the toolbox in your garage to componentry in gigantic earth movers, New Standard Corporation provides Original Equipment Manufacturer components, assemblies, and related services for products used in the agriculture, construction, mining, industrial, and power generation industries. As at companies everywhere, New Standard has seen information security move from the back shelf …

Business

Securing Victoria’s Secret’s Secrets — Defending Data and Operations to Support Global Fashion Brands

You’ve probably heard of Victoria’s Secret. And Calvin Klein, Gap, Lands’ End, Marks & Spencer, and Tommy Hilfiger. But you may have never heard of Brandix, one of the largest apparel suppliers to these and other top retail fashion brands. Sri Lanka’s largest apparel exporter, the Brandix Group employs approximately 48,000 people across 42 sites …

Business

Safe Soaring: McAfee Advances Customer Success with Integrated Analytics, Ecosystems, and Experiences at MPOWER

This blog was written by Barbara Kay. Security embodies the analogy of fixing a plane in flight. Every company has some variety of security people, process, and technology in place already. So, like a plane in flight, your security infrastructure needs an operational model that can be updated, adapted, repaired, or serviced while it is …

Business

Is that Broom Removing the Dirt? Sanitizing CCleaner with McAfee Advanced Threat Defense

This blog was written by Stan Golubchik. On Monday, security researchers in Cisco’s Talos division revealed that the ever popular, free computer clean up tool CCleaner had been compromised for at least the past month. Hackers utilized a backdoor vulnerability through the software’s updating system into the application. With an estimated installation base of 2.27 …

Business

Head of Security Operations Talks About His “Leap of Faith” Hiring McAfee Resident Support

Serving more than seven million clients and members, The Desjardins Group is the largest financial cooperative in Canada. Its employees like to say that it provides the gamut of financial services “from birth to death.” To protect the Group’s geographically dispersed network of 47,600 employees and 70,000 endpoints (including more than 8,000 servers), Christian Gauthier, …

Business

Interview with IS Director on Building a “Game Changing” Threat Defense Architecture

Director of Information Security Simon Brown oversees information security for the Liquor Control Board of Ontario (LCBO), one of the world’s largest retailers of beverage alcohol. LCBO operates 650 brick-and-mortar retail stores plus ecommerce and mobile storefronts across the Canadian province. The adaptable threat defense infrastructure that Brown and his very small IS team have …

Business

Cerber Ransomware Is Now Capable of Stealing Browser Passwords, Bitcoin Wallet Data

Adam Wosotowsky contributed to the blog. Threats are evolving, especially ransomware. Cerber ransomware, one of the most powerful strains out there, is no exception. The threat used to be a pretty run-of-the-mill ransomware, infecting devices through various social engineering techniques and encrypting files on an infected computer and demanding a ransom to restore them, but now, …