Steve Grobman

Steve Grobman is senior vice president and chief technology officer (CTO) for McAfee. In this role, Grobman sets the technical strategy and direction to create technologies which protect smart, connected computing devices and infrastructure worldwide. He drives McAfee innovation and leads thousands of technical resources to deliver robust and sophisticated cybersecurity solutions that protect corporate and consumer assets. Grobman is a trusted advisor to the industry and media in the field of cybersecurity defense and the evolving threat landscape.

Prior to joining McAfee, Grobman was at Intel where he spent over two decades in senior technical leadership positions related to the field of cybersecurity. His roles varied from protecting Intel’s own assets as an IT security architect to building new security architecture into hardware and software as the chief architect for Intel’s vPro platform. After the acquisition of McAfee in 2012, Grobman moved into the CTO office to drive new research and innovation capabilities for the division and was named worldwide CTO in 2014.

He has published multiple technical papers and books, and holds 24 U.S. and international patents in the fields of security, software, and computer architecture, with another roughly 20 patents pending.

Grobman earned his bachelor's degree in computer science from North Carolina State University.
Am Morgen des 12. Mai, einem Freitag, meldeten mehrere Quellen in Spanien den Ausbruch einer Ransomware-Variante, die inzwischen als „WannaCry“ identifiziert wurde. Sofort nach dem Eingang dieser Informationen begann McAfee, die Ransomware-Exemplare zu analysieren, Hinweise zur Beseitigung auszuarbeiten und Erkennungs-Updates für unsere Kunden zu entwickeln. Am Freitagnachmittag war das McAfee Global Threat Intelligence-System bereits aktualisiert und ...
Read Blog
Le vendredi 12 mai en matinée, de nombreuses sources en Espagne ont été les premières à signaler l'apparition d'une vague d'attaques informatiques menées à l'aide du ransomware désormais identifié sous le nom de WannaCry. Dès que McAfee a été informé de ces incidents, notre équipe s'est immédiatement attelée à analyser des échantillons de ce logiciel de ...
Read Blog
En mi última publicación hablé sobre los atributos de nuestros adversarios, los motivos por detrás de sus actividades y las metodologías de ataque recientes. También hablé de la curva de eficacia de la defensa contra amenazas, que ilustra cómo disminuye la eficacia de las capacidades de ciberdefensa a lo largo del tiempo conforme los atacantes ...
Read Blog
In my last post, I discussed the attributes of our adversaries, the drivers behind their activities, and their recent attack methodologies. I also discussed the threat defense efficacy curve, which illustrates how cyber defense capabilities decline in efficacy over time as attackers develop countermeasures to evade them. My FOCUS 16 keynote last week also explained ...
Read Blog
This week at the FOCUS’16 conference in Las Vegas, I shared perspectives on today’s changing threat landscape, how we must re-think cyber defense technologies, and McAfee's vision for thwarting the cyber-threats of tomorrow. In 2016, we saw significant cases of cyber activity from criminals, nation-states, and hacktivists. In each case, they’ve really upped their game. ...
Read Blog
I’m privileged to lead a group of McAfee leaders to the annual Aspen Security Forum this week. This event is among the most prestigious gatherings of its kind. Dozens of government leaders, tier one journalists, and private-sector companies like ours connect in Aspen each July to discuss the most pressing national security issues facing the ...
Read Blog
A revolution in human-machine teaming for security operations is at hand. Cybersecurity has two great resources that work well together -- experienced security ops personnel and learning machines. Machines can work at the speed of electrons and process enormous quantities of data, but they are challenged when dealing with unforeseen scenarios. Human judgment and experience ...
Read Blog
How to identify risks, understand downstream effects, and prepare for incidents. You’ve got your organization protected as best you can, but what about your supply chain? Like any type of chain, the security in your supply chain is only as good as the weakest link. Can malicious software find its way into your company or ...
Read Blog
The security industry has, for years, been developing technologies to secure our applications and operating systems. 2015 was the year, however, I feel hardware vulnerabilities truly became real. We saw multiple instances of attackers using hardware, firmware, and BIOS as an element of their attack, from Rowhammer exploiting DRAM to the Equation Group showcasing vulnerabilities ...
Read Blog