Chance of a Lifetime

By on

This blog was written by Brian Dye.

Writing from the FOCUS 16 Security Conference, Wed., Nov. 2

I just came out of one of the most energetic keynote sessions I have ever seen.

Chris Young, who heads McAfee, mapped out a vision for the future of our company. It was overwhelming.

I don’t need to re-quote figures on the problems with cyber-attacks and security threats on the Web. It’s something we all are aware of. All you have to do is read a news site or pick up a newspaper. Security is probably the biggest challenge to the Digital Age.

Our industry – cybersecurity – is moving faster than any other segment of IT. And McAfee is right in the center of what’s happening.

This year McAfee introduced 18 new products. We developed four integrated security systems. We moved forward, fast, on our industry partnerships, which are now up to 125.

This morning Chris unveiled the new McAfee logo, which will go into full effect early next year, when the company formally spins out from Intel (though Intel is hanging on to 49% of us!). At that point we will be one of the largest pure-play cyber security companies in the world. Our goal is to also be the #1 security partner.

We aim to move even faster in 2017, and actually increase our product introductions, chiefly through organic innovation. We will continue to move into the cloud and integrated solutions, and with the opening of DXL (https://github.com/opendxl), we expect to greatly accelerate our partnerships.

If I could be personal for a moment, this for me is one of the greatest chances of my lifetime. I’m working in a great company, with a fantastic team of over 2000 engineers, at a time when what we do is needed by the world more than ever.

Chris has given us our marching orders. #1. Agile. Integrated. Cloud-based. And working together within the industry, not just turning out point widgets.

The future is open. What’s your opinion? I’d like to hear from you.

Best,

Brian

Leave a Comment

Similar articles

2018 was a wild ride when it came to cybersecurity. While some hackers worked to source financial data, others garnered personal information to personalize cyberattacks. Some worked to get us to download malware in order to help them mine cryptocurrency or harness our devices to join their botnets. And the ways in which they exact ...
Read Blog
Your home screen is just a matrix of numbers. Your device loses its charge quickly, or restarts suddenly. Or, you notice outgoing calls that you never dialed. Chances are your smartphone has been hacked. The sad truth is that hackers now have a multitude of ways to get into your phone, without ever touching it. ...
Read Blog
Rockstar Games’ Red Dead Redemption 2 has struck a popular chord with many online gamers. Unfortunately, the Western-themed action-adventure game has also become a popular vessel for malicious activity among cybercriminals as well. Scammers are tricking gamers into giving up their personal information with phony “free” downloads of the online game, while simultaneously making a ...
Read Blog