Search Results for: threat intelligence sharing

On January 23, 2017 President Trump issued an executive order placing a freeze on the hiring of federal civilian employees across the executive branch. The freeze applies to all executive departments and agencies, regardless of the sources of their operational and programmatic funding, with the exception of military personnel. In a time of ever-increasing IT ...
Read Blog
This blog post was written by Vincent Weafer. With each new cyber threat report, we learn about the increasing volume of new, complex threats appearing across a myriad of server systems, networking equipment, personal computing platforms, and IoT devices. We also read about the real-world challenges that information security professionals face when attempting to identify, ...
Read Blog
This blog was written by Barbara Kay. Finding new ways to extract more value from security operations is a hot priority for most CISOs and security architects as they progress toward the goal of a proactive and optimized security operation. But according to our research, 26% of security operations centers (SOCs) still operate in reactive ...
Read Blog
This blog was written by Barbara Kay. In the absence of hard figures, improved threat detection can be difficult to sell to executive management, especially when competing with mandated projects and buzzword-rich initiatives. We’ve created a program that helps CISOs influence and drive urgency through quantifiable business outcomes that speak to organizational goals. Here’s an ...
Read Blog
This post first appeared at Policy@Intel on March 9. In an effort to accelerate cyber information sharing, and in response to a presidential executive order, the Department of Homeland Security recently announced the formation of the Information Sharing and Analysis Organization (ISAO) Standards Organization. The organization comprises six working groups, and I’ve been appointed chair ...
Read Blog
This blog post was written by Vincent Weafer. In the McAfee Labs 2016 Threats Predictions report, published today, we developed two distinct views of the future. For the first section of the report, we interviewed 21 key people within  McAfee Labs, Foundstone Professional Services, and the Office of the CTO's Advanced Threat Research teams. They were asked to ...
Read Blog
This week we’re heading to Colorado for the Aspen Institute’s annual Aspen Security Forum. I’ll be speaking on a Friday panel entitled “WMD: The Nightmare Scenario,” discussing the application of cyber-attacks against critical infrastructure such as water systems, power plants, the electric grid, and industrial systems such as chemical plants. Cyberspace is now widely acknowledged ...
Read Blog