Business

Oversharing: Passwords, but not Toothbrushes!?

Potentially significant security risks from your employees’ significant others What would you be more likely to share with your partner? Your toothbrush? Or your work password? Only about 10% of people polled are willing to share their toothbrush, but twice as many are willing to share their work password! People share a lot with their …

Business

RSA 2017: Can’t Miss Events

Let the countdown begin: RSA is almost here! The RSA conference in San Francisco is only a week away, and this year the theme is “Power of Opportunity,” inspired by the zen teaching to “pursue even the most advanced study with the mindset of a beginner.” We’re officially inspired (and excited). Whether you’re a RSA …

Business, Technical How To

Upcoming Intel Security Webcast on Maturing the Threat Management Lifecycle with Ismael Valenzuela and Jacqueline Stokes

How you manage threats is paramount to your organization’s success as a business and in some respects, necessary for your survival. Join Foundstone Services for an in-depth discussion about how you can mature the process of threat management and continuously refine your threat detection and response capabilities. Presented by Ismael Valenzuela, Global Director of Foundstone …

Cloud Security

Cloud Services: Build or Buy?

Cloud computing is here to stay. Like it or not. But how does a cloud computing user know if the system is safe to store and process vital business and personal data? How do cloud service providers build the necessary trust, manage risk, and protect vital data in cloud systems? You need the flexibility, scalability, …

Business, McAfee Labs

Big, Hard-to-Solve Problems

Improving the Lifecycle of Threat Defense Effectiveness When a new security tool or technique is released, Version 1.0 is usually pretty effective, and successive versions get even better with real-world scenarios and user feedback. Eventually, the bad guys realize that this new thing is causing them real problems, so they start looking for ways over, …

Business, McAfee Labs

Welcome to the Wild West, Again!

Threats, Regulations, and Vendor Responses to Risks in the Internet of Things The Wild West, a place of exaggerated lawlessness in the United States during the 1800s, has returned once again as a metaphor for the Internet of Things (IoT). Driven by similar issues of exploration, homesteading, and prospecting for riches, IoT devices are becoming …