This blog post was written by Penny Baldwin. Today’s job market is a foreign landscape when compared with what it was when I graduated college from San Francisco State University. At that time, applying for entry-level job positions was about a strong resume and cover letter as opposed to what came up when someone searched ...
Read Blog
The third meeting of the International Standards Organization’s (ISO) Special Working Group (SWG) on (Internet of Things) recently took place in Chongqing, China.  The purpose of the SWG is essentially to assess what has been done to date related to IoT standards and provide guidance to ISO about the ISO so that the existing standards ...
Read Blog
Last week, I discussed security-aware attacks that are capable of identifying and evading security solutions deployed on a system. One of the hallmarks of the new class of security-aware attacks is that they are specifically designed to bypass or avoid traditional security tools such as gateways and firewalls. In some cases, the design is so ...
Read Blog
 Everyone with an account on a smart phone, tablet, laptop or PC also knows about phishing, scamming, password and identity theft, and to some degree, file intrusion and hardware destruction through advanced malware. Probably less well known is the fact that savvy hackers will focus on individuals in specific businesses and high-end residential zip and ...
Read Blog
I hope you enjoyed a great summer vacation with your families and loved ones. Personally I had a wonderful and sunny holiday with my family in the south of Spain. Do you remember those days when the summers were quiet and peaceful?  Where almost nothing notable was happening? I am afraid that those days are ...
Read Blog
  In conjunction with our investigation into Operation Troy, we will be releasing IOC data in the open and highly flexible OpenIOC Framework format.       In addition to various open/free tools, OpenIOC data can be consumed by:             McAfee Network Security Platform             ...
Read Blog
May has been another very busy month packed with events and plenty of travel! I spent a few days with some of our best sales people at the McAfee President’s Club in Venice and Croatia, followed by a short stop at the McAfee Executive Summit in Frankfurt where I had the pleasure of catching up ...
Read Blog
We previously wrote about what it means to be a security-obligated executive – how to identify threat warning signs and prep against cyber-attacks. Historically either the C-suite and the security teams haven’t spoken at all, or security teams haven’t spoken to execs in a simple enough language to be understood. At McAfee, we often educate ...
Read Blog
This will be old news to those of you who took the time to visit McAfee Focus 2012 , but for the rest - my team took the opportunity to introduce the concept of the McAfee "Little Red Box" in the Innovation roadshow. It's a prototype project that my team has been working on for some ...
Read Blog
Late last week, reports began to surface that the Israeli police (along with other regional law enforcement) were targeted by a malware attack.  The entry vector was described as a phishing campaign sent from Benny Gantz (head of the Israeli Defense Forces).  Initially, details and indicators around the malware were beyond sparse. Aside from the FROM: address, ...
Read Blog