Steve Grobman

Steve Grobman is senior vice president and chief technology officer at McAfee. In this role, he sets the technical strategy and direction to create technologies that protect smart, connected computing devices and infrastructure worldwide. He leads McAfee’s development of next-generation cyberdefense and data science technologies, threat and vulnerability research, and internal CISO and IT organizations.

Prior to joining McAfee, he dedicated more than two decades to senior technical leadership positions related to cybersecurity at Intel Corporation, where he was an Intel Fellow.

He has written numerous technical papers and books and holds 27 U.S. patents. He earned his bachelor's degree in computer science from North Carolina State University.
The morning of Friday, May 12 multiple sources in Spain began reporting an outbreak of the ransomware now identified as WannaCry. Upon learning of these incidents, McAfee immediately began working to analyze samples of the ransomware and develop mitigation guidance and detection updates for its customers. By Friday afternoon, McAfee's Global Threat Intelligence system was ...
Read Blog
Am Morgen des 12. Mai, einem Freitag, meldeten mehrere Quellen in Spanien den Ausbruch einer Ransomware-Variante, die inzwischen als „WannaCry“ identifiziert wurde. Sofort nach dem Eingang dieser Informationen begann McAfee, die Ransomware-Exemplare zu analysieren, Hinweise zur Beseitigung auszuarbeiten und Erkennungs-Updates für unsere Kunden zu entwickeln. Am Freitagnachmittag war das McAfee Global Threat Intelligence-System bereits aktualisiert und ...
Read Blog
Le vendredi 12 mai en matinée, de nombreuses sources en Espagne ont été les premières à signaler l'apparition d'une vague d'attaques informatiques menées à l'aide du ransomware désormais identifié sous le nom de WannaCry. Dès que McAfee a été informé de ces incidents, notre équipe s'est immédiatement attelée à analyser des échantillons de ce logiciel de ...
Read Blog
En mi última publicación hablé sobre los atributos de nuestros adversarios, los motivos por detrás de sus actividades y las metodologías de ataque recientes. También hablé de la curva de eficacia de la defensa contra amenazas, que ilustra cómo disminuye la eficacia de las capacidades de ciberdefensa a lo largo del tiempo conforme los atacantes ...
Read Blog
In my last post, I discussed the attributes of our adversaries, the drivers behind their activities, and their recent attack methodologies. I also discussed the threat defense efficacy curve, which illustrates how cyber defense capabilities decline in efficacy over time as attackers develop countermeasures to evade them. My FOCUS 16 keynote last week also explained ...
Read Blog
This week at the FOCUS’16 conference in Las Vegas, I shared perspectives on today’s changing threat landscape, how we must re-think cyber defense technologies, and McAfee's vision for thwarting the cyber-threats of tomorrow. In 2016, we saw significant cases of cyber activity from criminals, nation-states, and hacktivists. In each case, they’ve really upped their game. ...
Read Blog
I’m privileged to lead a group of McAfee leaders to the annual Aspen Security Forum this week. This event is among the most prestigious gatherings of its kind. Dozens of government leaders, tier one journalists, and private-sector companies like ours connect in Aspen each July to discuss the most pressing national security issues facing the ...
Read Blog
A revolution in human-machine teaming for security operations is at hand. Cybersecurity has two great resources that work well together -- experienced security ops personnel and learning machines. Machines can work at the speed of electrons and process enormous quantities of data, but they are challenged when dealing with unforeseen scenarios. Human judgment and experience ...
Read Blog
How to identify risks, understand downstream effects, and prepare for incidents. You’ve got your organization protected as best you can, but what about your supply chain? Like any type of chain, the security in your supply chain is only as good as the weakest link. Can malicious software find its way into your company or ...
Read Blog
The security industry has, for years, been developing technologies to secure our applications and operating systems. 2015 was the year, however, I feel hardware vulnerabilities truly became real. We saw multiple instances of attackers using hardware, firmware, and BIOS as an element of their attack, from Rowhammer exploiting DRAM to the Equation Group showcasing vulnerabilities ...
Read Blog