It comes as no surprise that ransomware is the fastest growing form of criminal malware, accelerating in quantity 128% year over year. This plethora of ransomware is, however, primarily acting across one type of playing field- the web. In fact, 80% of the methods used to deliver criminal malware are web-based, such as a ...
Read Blog
Today’s digital world is drastically different than it was 10 years ago.  It is arguably, drastically different than it was 1 year ago.  The migration from on premise solutions to cloud solutions, mobility, IoT, client computing have all evolved to name a few.  The numerous innovations are continually evolving. Those innovations are plaguing security professionals ...
Read Blog
Another Black Hat USA conference has come and gone, but, much like every year, a lot of incredible insights remain. And McAfee was a major contributor to those insights. Our presenting researchers offered several great demonstrations this year, but three sessions stood out particular for their insight into future ransomware scenarios: Enjoy Your Coffee, Pay ...
Read Blog
How important is a comprehensive, fully integrated security strategy for an enterprise? Just ask Michelle Duprey, Manager of Information Security at Boston Medical Center (BMC). The academic medical center, based in Boston, is the largest safety-net hospital in New England. A business that robust demands a modern security defense. When Duprey first joined the hospital ...
Read Blog
Isn’t it time to invest in a security solution that doesn’t break the bank? One bank offers a textbook case study in corporate data security, since by definition it’s required to safeguard clients’ highly sensitive personal and financial data. This U.S.-based regional commercial bank has undergone a sea of change in its approach to security ...
Read Blog
In a number of recently publicized breaches, and probably many other attacks, information that could have enabled the security team to catch and contain the attack were lost in the sheer volume of alerts. Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential indicators of attack or compromise ...
Read Blog
It takes a village. With today’s vast cybercriminal network churning out sophisticated attacks by the minute, it’s virtually impossible for any single security solution to combat today’s threats alone. For years, organizations have resorted to layering security technologies and deploying best-of-breed point solutions at various control points, trying to achieve better protection. However, the lack ...
Read Blog
In their recent 2015 Global Business Technographics® Security Survey, Forrester reports that improving threat intelligence capabilities is a top priority for 71% of enterprises. But enterprises don’t need to improve their ability to gather threat intelligence—the abundance of shared intelligence and threat inputs is already overwhelming for security teams. Operationalizing the intelligence once you have ...
Read Blog
In a blog last week, I discussed CryptoLocker, a particularly nefarious family of ransomware, and how to defend against it. I thought it would be worthwhile to demonstrate how McAfee Threat Intelligence Exchange can detect and stop malware like ransomware, even if the suspicious file has not been flagged as malware by antivirus signatures. In ...
Read Blog
This blog was written by Barbara Kay. Today the SANS Institute released its survey on adoption of the Top 20 Critical Security Controls (CSCs) for Effective Cyber Defense. It’s a worthwhile read for CISOs and security analysts charged with overseeing security and risk management. The survey documents adoption highlights and hurdles, primarily experienced by financial services ...
Read Blog