One of the biggest challenges for Data Protection solution is identifying sensitive data.  Today, organizations generate various types of sensitive data, ranging from regulated data such as PCI to unstructured data such as product designs.  Not all sensitive data can be identified and protected via regular expressions and keywords. By supplementing End-user Classification to the ...
Read Blog
Some of you may know this, but before coming to McAfee, I worked for Cisco Systems.  So believe me when I say that Cisco is no push-over.  Cisco is competitive and the people at Cisco work hard to win.  That’s why I was particularly interested in the news that Cisco recommended McAfee for its IronPort ...
Read Blog
Last month, Gartner published its 2012 Magic Quadrant for Network Intrusion Prevention Systems. As in previous years, Gartner’s 2012 results show McAfee as a leader in what has become a very competitive vendor landscape. Gartner states that “the capabilities of IPS products need to adapt to changing threats, and next-generation IPSs (NGIPSs) have evolved in ...
Read Blog
Following our acquisition of NitroSecurity last year, we have been working towards fully integrating their Security Information and Event Management (SIEM) technology into our portfolio of solutions. McAfee Enterprise Security Manager (the fruit of our combined efforts) recently received a 5-star rating from SC Magazine, and now we are proud to announce that McAfee has ...
Read Blog
Network and mobile data breaches get much of the publicity today, but there’s another less publicized avenue susceptible to both insider and outsider attacks: backup. In early April, for example, Emory Healthcare in Atlanta lost the personal information of 315,000 patients when it discovered that 10 backup discs were missing. Threats to backups come from ...
Read Blog
As more and more transactions are carried out online, credit card security and the need to achieve universal PCI Data Security Standard (PCI DSS) compliance continue to be a key issue. Many eCommerce merchants, especially retailers who fall within the small to medium category, are neglecting to keep up to date with the PCI standards required ...
Read Blog
A few weeks ago, Iran reported intensified cyberattacks on its energy sector that they observed as a direct continuation of the Stuxnet and Duqu attacks. Over the weekend, the IR Cert (Iran’s emergency response team) published a new report that describes this attack as Flame and/or Flamer. Some other news agencies also called  the attack ...
Read Blog
I’m kicking off a series of blog posts over the coming weeks and months related to emerging markets. Look for countries such as Mexico, Brazil, Peru, Colombia, and South Africa to be discussed. Later, we’ll explore other countries including those in Asia as well as Europe and the Middle East. The terms “emerging markets” and ...
Read Blog
Facebook, Twitter, LinkedIn and other social media platforms are invaluable tools for 21st century enterprise collaboration and marketing, but they introduce multiple security hazards that organizations struggle to address. Dangers include confidential data leakage, reputational damage, social engineering opportunities for hackers, malware, and lawsuits stemming from inappropriate use by employees who see social media as ...
Read Blog