Executive Perspectives

World Economic Forum Sets High Bar on Public-Private Cybersecurity Partnerships

This week’s World Economic Forum (WEF) in Davos, Switzerland featured the launch of the World Economic Forum System Initiative on Shaping the Future of Digital Economy and Society, a global platform for coalitions of public and private sector entities to “collaborate and accelerate progress against shared digital economy goals and to shape a digital future …


Out Innovating the Adversary, Part 2

My last post discussed the challenges of working to out-innovate our adversaries given the growing variety of objectives they might pursue, and the growing variety of methods they might use in pursuit of those objectives. As mentioned, part of the answer to these challenges lies in thinking differently about threat defense, and in understanding that …


Out Innovating the Adversary, Part 1

Deep down, if I think about who I am, I’m a scientist who loves to solve problems. If you think about cybersecurity, its problems are unique in that we are not only competing against industry competitors, we are also competing against the adversaries behind the cyber-attacks. My recent keynote at MPOWER17 Las Vegas focused on …

Business, Executive Perspectives

Why Human-Machine Teaming Will Lead to Better Security Outcomes

Artificial intelligence and machine learning have never been more prominent in the public forum. CBS’s 60 Minutes recently featured a segment promising myriad benefits to humanity in fields ranging from medicine to manufacturing. World chess champion Garry Kasparov recently debuted a book on his historic chess game with IBM’s Deep Blue. Industry luminaries continue to opine about the potential threat by AI to human jobs and even humanity itself. Much of the conversation focuses on machines replacing humans. But the fact is the future doesn’t have to see humans eclipsed by machines.

Business, Executive Perspectives, McAfee Labs, Neutralize Threats

WannaCry: The Old Worms and the New

The morning of Friday, May 12 multiple sources in Spain began reporting an outbreak of the ransomware now identified as WannaCry. Upon learning of these incidents, McAfee immediately began working to analyze samples of the ransomware and develop mitigation guidance and detection updates for its customers. By Friday afternoon, McAfee’s Global Threat Intelligence system was …

German, Neutralize Threats

WannaCry – über alte und neue Würmer

Am Morgen des 12. Mai, einem Freitag, meldeten mehrere Quellen in Spanien den Ausbruch einer Ransomware-Variante, die inzwischen als „WannaCry“ identifiziert wurde. Sofort nach dem Eingang dieser Informationen begann McAfee, die Ransomware-Exemplare zu analysieren, Hinweise zur Beseitigung auszuarbeiten und Erkennungs-Updates für unsere Kunden zu entwickeln. Am Freitagnachmittag war das McAfee Global Threat Intelligence-System bereits aktualisiert und …

Executive Perspectives, Français, McAfee Labs, Neutralize Threats

WannaCry : les vers d’hier font peau neuve

Le vendredi 12 mai en matinée, de nombreuses sources en Espagne ont été les premières à signaler l’apparition d’une vague d’attaques informatiques menées à l’aide du ransomware désormais identifié sous le nom de WannaCry. Dès que McAfee a été informé de ces incidents, notre équipe s’est immédiatement attelée à analyser des échantillons de ce logiciel de …

Business, Español

Defensa Evolucionada: De Inteligencia de Amenazas a Investigación y Orquestación con DXL

En mi última publicación hablé sobre los atributos de nuestros adversarios, los motivos por detrás de sus actividades y las metodologías de ataque recientes. También hablé de la curva de eficacia de la defensa contra amenazas, que ilustra cómo disminuye la eficacia de las capacidades de ciberdefensa a lo largo del tiempo conforme los atacantes …

Business, Executive Perspectives

Defense Evolved: From Threat Intelligence, to Investigation, to Orchestration with DXL

In my last post, I discussed the attributes of our adversaries, the drivers behind their activities, and their recent attack methodologies. I also discussed the threat defense efficacy curve, which illustrates how cyber defense capabilities decline in efficacy over time as attackers develop countermeasures to evade them. My FOCUS 16 keynote last week also explained …

Executive Perspectives

Hardware.Next: Diving deeper into the stack—understanding the dangers of hardware and firmware vulnerabilities

The security industry has, for years, been developing technologies to secure our applications and operating systems. 2015 was the year, however, I feel hardware vulnerabilities truly became real. We saw multiple instances of attackers using hardware, firmware, and BIOS as an element of their attack, from Rowhammer exploiting DRAM to the Equation Group showcasing vulnerabilities …