Cloud Security

Can You Bust a Cloud Myth?

We hear about “the cloud” more and more everyday – cloud storage, cloud computing, and cloud security. But with so much information around the cloud flooding our streams, it’s hard to decipher what’s a myth and what’s a fact. That being said, we wanted to test exactly what you know– or, what you think you …

Business

That’s a Wrap! Recapping RSA 2017

We don’t know about you, but RSA 2017 was quite the busy and exciting week! From Chris Young to Seth Meyers, breakout sessions, “CyBEER” tastings, and the San Francisco views, this year’s RSA did not disappoint! Here are some of our favorite moments from the week: At the Conference Chris Young Keynote On Tuesday, February …

Business

Fake Font Update on Google Chrome Uses Social Engineering to Infect Users with Ransomware

We’ve seen social engineering attacks manipulate users time and time again. From phishing emails, to baiting attempts – this breed of cyberthreat has continued to manipulate users for years. And now a new scam has emerged that utilizes a fake update on Google Chrome to trick users into downloading and infecting themselves with the infamous Spora ransomware. …

Business

Oversharing: Passwords, but not Toothbrushes!?

Potentially significant security risks from your employees’ significant others What would you be more likely to share with your partner? Your toothbrush? Or your work password? Only about 10% of people polled are willing to share their toothbrush, but twice as many are willing to share their work password! People share a lot with their …

Business

RSA 2017: Can’t Miss Events

Let the countdown begin: RSA is almost here! The RSA conference in San Francisco is only a week away, and this year the theme is “Power of Opportunity,” inspired by the zen teaching to “pursue even the most advanced study with the mindset of a beginner.” We’re officially inspired (and excited). Whether you’re a RSA …

Business, Technical How To

Upcoming Intel Security Webcast on Maturing the Threat Management Lifecycle with Ismael Valenzuela and Jacqueline Stokes

How you manage threats is paramount to your organization’s success as a business and in some respects, necessary for your survival. Join Foundstone Services for an in-depth discussion about how you can mature the process of threat management and continuously refine your threat detection and response capabilities. Presented by Ismael Valenzuela, Global Director of Foundstone …

Cloud Security

Cloud Services: Build or Buy?

Cloud computing is here to stay. Like it or not. But how does a cloud computing user know if the system is safe to store and process vital business and personal data? How do cloud service providers build the necessary trust, manage risk, and protect vital data in cloud systems? You need the flexibility, scalability, …

Business, McAfee Labs

Big, Hard-to-Solve Problems

Improving the Lifecycle of Threat Defense Effectiveness When a new security tool or technique is released, Version 1.0 is usually pretty effective, and successive versions get even better with real-world scenarios and user feedback. Eventually, the bad guys realize that this new thing is causing them real problems, so they start looking for ways over, …

Business, McAfee Labs

Welcome to the Wild West, Again!

Threats, Regulations, and Vendor Responses to Risks in the Internet of Things The Wild West, a place of exaggerated lawlessness in the United States during the 1800s, has returned once again as a metaphor for the Internet of Things (IoT). Driven by similar issues of exploration, homesteading, and prospecting for riches, IoT devices are becoming …

Business, Español

Próximo Webcast de Intel Security sobre Predicciones de Amenazas 2017 de McAfee Labs, moderado por el CTO de Intel Security, Raj Samani

Predicciones de Amenazas de McAfee Labs 2017 La superficie de ciber-ataques está creciendo más rápido que nunca, impulsada por tendencias y tecnologías como la computación en nube y el Internet de las cosas (IoT). Conforme el escenario digital evoluciona, también lo hacen las amenazas. ¿Qué podemos esperar en un año, o en cuatro años? Prepárese …

Cloud Security

How Secure Is Your Private Cloud?

Blog post written by Peter Bury. There is a lot of emphasis and excitement around the growth and versatility of public clouds, overshadowing the strong growth and development of private clouds. A private cloud is not just a virtualized infrastructure of compute and storage services. It is an automated and orchestrated system of virtualized compute, …

Business

McAfee MOVE AntiVirus Enables Security and Savings

Warehouse retailers thrive by taking advantage of efficiencies that happen at scale and passing those savings on to consumers. But those money-saving efficiencies aren’t just found in the merchandise on the shelves, they’re also found on the backend in the form of more efficient IT infrastructure. One such retailer with hundreds of locations worldwide uses …

Optimize Operations

Upcoming Intel Security webcast on SIEM, with cybersecurity expert Peter Stephenson

Each month, we’ll highlight upcoming webcasts and Tech Talks on industry trends and topics in a blog post. See below for can’t-miss online events coming up with Intel Security: Prepare Your SOC for the Convergence of Advanced Threat Management & SIEM Learn from cybersecurity expert Peter Stephenson and Intel Security’s Michael Leland as they discuss …