Security Operations

McAfee enables security operations to collect, enrich, and share data at any scale, rapidly turn data into insights, and quickly investigate and act. The McAfee team provides the latest information on SecOps changes, threats, protection and more.

Security Operations

How to Gain a Competitive Advantage with an Integrated Approach to Security

Simply adding an advanced threat analysis technology to your security stack can expand detection and solve some immediate security issues. But thinking beyond standalone detection to an integrated ecosystem can not only improve detection and protection throughout your organization, it can also enhance your business by optimizing security operations response ...

Security Operations

Leveraging UEBA Capabilities in Your Existing SIEM

This blog post was written by Kristen Jacobsen. User and entity behavior analytics (UEBA) uses advanced analytics to track and flag suspicious behaviors of both users and assets, such as networked assets, sensors, databases, devices, and hosts. There are many reasons why UEBA is gaining traction as both an integrated ...

Security Operations

Please Vote: Fourth Annual SANS IR Survey Wants You!

This blog was written by Barbara Kay. Past survey findings have helped us understand key trends such as the hurdles holding back success, the evolution of SOC maturity, the data being targeted, use of automation, and priority investments for improving results. This market is changing quickly, and surveys are an ...

Endpoint Security Security Operations

Super Hero like Speed on DXL

Superheroes are part of the lore of American culture — the thought of human-being acquiring superhuman power such as flight, invisibility, breathing underwater has always been intriguing to many.  The thought of speed and agility is one of those sets of powers that has caught a lot of attention — ...

Security Operations

SIEM is your Analyst’s Best Technology Partner

This blog post was written by Karl Klaessig. For the average security analyst, it’s no secret that their days are overloaded with more “hair on fire” moments than “Zen” moments. The 2016 SANS Incident Response Survey paints a clear and sobering picture of the demands being placed on security analysts. ...

Endpoint Security Security Operations

McAfee – Cybercrime is a firefight! Time for Automation.

Those who have experienced them know how scary their world becomes when a grass fire or forest fire gets out of control. As these fires become more intense, they create their own weather, generating their own winds, making them more difficult to fight and often moving far faster than firefighters ...

Security Operations

Eating an Elephant: How the ESM 10 UX Team Reenergized SecOps (Part 2)

This blog was written by Barbara Kay. The second of a two-part series. In the previous post in this series, we described how re-creating the user experience for overburdened SOC analysts was a task like “eating an elephant.” To help analysts who are constrained by time and cognitive overload, we ...

Security Operations

Eating an Elephant: How the ESM 10 UX Team Reenergized SecOps (Part 1)

This blog was written by Barbara Kay. The first of a two-part series For some reason, elephants figure frequently in our conversations – “seeing different parts of the elephant”, “memory like an elephant,” and now, “eating an elephant.” This phrase, definitely meant as an analogy, expresses the lengthy, enormous, and ...

Security Operations

Change, embrace it – Why you need to change the way you look at security

Change.  “There is a time appointed for everything and a time for every purpose—” Imagine trying to change a cowboy wagon to upgrade its performance to make it comparable to a Ferrari?  Crazy right?  We’d never try right?  Because the wagon has a fundamentally different architecture and was built for a different purpose. ...

Security Operations

Mission Made Possible: The Open Integration Time Machine

This blog was written by Barbara Kay. A fast-forward button for integration to a unified security architecture. One of the reasons why the Mission Impossible premise has resonated across the generations is that all of us, at one time or another, are handed projects that seem to come with that ...

Subscribe to McAfee Securing Tomorrow Blogs