Where would we be without our mobile phones?  Our kids, boss, friends – so many people reach out to us via our mobile phone.  And unfortunately, hackers have also started reaching out – in major ways. The severity of attacks on mobile devices is often underestimated. It is now common to have employees use their ...
Read Blog
Suddenly, it’s December, and the beginning of the holiday season. Your coworkers are now distracted with getting in their PTO, flying home to be with family, and completing their shopping lists. But the holiday season isn’t always filled with cheer, it’s got some scrooges too – cybercriminals, who hope to take advantage of the festive ...
Read Blog
If you’re an avid reader of threat trends or a fan of red team exercises, you’ve probably come across a reference to the MITRE ATT&CK framework in the last few months. If you have ever wondered what it was all about or if you’ve never heard of it but are interested in how you can ...
Read Blog
It’s easy to write blogs about the challenges we face in our industry. They are pretty easy to name – fragmentation, complexity, the need for a holistic defense strategy that is cohesively managed. As the sprawl of new types of connected devices widens, the challenge of protecting them seems to only grow more complicated. But ...
Read Blog
We all need to take a vacation to energize our personal batteries. However, many of us find it hard not to check email or look at the latest update from our executive team.  Until I started working on MVISION Mobile, an enterprise security product which McAfee announced on July 17th, I will admit I didn’t ...
Read Blog
Over the years, cybersecurity vendors have created a storm of complexity to defend devices and put the burden on one load-bearing support beam – the administrator.  The expansion of devices, operating systems, attack surfaces, and forms of attack have spawned a storm system on our devices:  a tsunami of clients, tornado of management consoles, and ...
Read Blog
A new SANS 2018 Survey on Endpoint Protection and Response, co-sponsored by McAfee, reports that the top threats to organizations include web-based malware, social engineering and ransomware—all of which focus on user endpoints. So what does that mean when you are trying to protect an ever-changing attack surface?  The survey results point to three best ...
Read Blog