Suddenly, it’s December, and the beginning of the holiday season. Your coworkers are now distracted with getting in their PTO, flying home to be with family, and completing their shopping lists. But the holiday season isn’t always filled with cheer, it’s got some scrooges too – cybercriminals, who hope to take advantage of the festive ...
Read Blog
If you’re an avid reader of threat trends or a fan of red team exercises, you’ve probably come across a reference to the MITRE ATT&CK framework in the last few months. If you have ever wondered what it was all about or if you’ve never heard of it but are interested in how you can ...
Read Blog
It’s easy to write blogs about the challenges we face in our industry. They are pretty easy to name – fragmentation, complexity, the need for a holistic defense strategy that is cohesively managed. As the sprawl of new types of connected devices widens, the challenge of protecting them seems to only grow more complicated. But ...
Read Blog
We all need to take a vacation to energize our personal batteries. However, many of us find it hard not to check email or look at the latest update from our executive team.  Until I started working on MVISION Mobile, an enterprise security product which McAfee announced on July 17th, I will admit I didn’t ...
Read Blog
Over the years, cybersecurity vendors have created a storm of complexity to defend devices and put the burden on one load-bearing support beam – the administrator.  The expansion of devices, operating systems, attack surfaces, and forms of attack have spawned a storm system on our devices:  a tsunami of clients, tornado of management consoles, and ...
Read Blog
A new SANS 2018 Survey on Endpoint Protection and Response, co-sponsored by McAfee, reports that the top threats to organizations include web-based malware, social engineering and ransomware—all of which focus on user endpoints. So what does that mean when you are trying to protect an ever-changing attack surface?  The survey results point to three best ...
Read Blog
It’s the security weaknesses you don’t know about or the next zero-day threat that keeps most of us up at night. That’s why when it comes to testing for effectiveness against threats, it’s critical to look at how a defense works to combat current, real world samples. After all, you need to know how your ...
Read Blog