Search Results for: threat intelligence sharing

Enhanced analytical capabilities will help organizations better understand how attacks will unfold, and how to stop them in their earliest stages.  Prediction is as old as humankind, as we’ve search for clues to the future. Big data, computer models, and sophisticated algorithms have brought us much closer to accurately predicting things such as actuarial tables, ...
Read Blog
A strong defense against compromise involves three layers: hardening devices, securing communications, and monitoring behavior.  If criminals breach data security and steal credit card numbers or personal information, your company suffers loss of reputation and potentially significant intangible costs. If they breach security of your cyber-physical control systems, you could be facing damage or destruction ...
Read Blog
There’s no doubt the threat landscape is a complex one. Each month brings a new example of a targeted attack against an organization that was previously considered “invulnerable.” This begs the question, “What went wrong?” With today’s targeted attacks, there’s more importance than ever before to review your infrastructure to ensure you have a comprehensive ...
Read Blog
Last month, Gartner published its 2012 Magic Quadrant for Network Intrusion Prevention Systems. As in previous years, Gartner’s 2012 results show McAfee as a leader in what has become a very competitive vendor landscape. Gartner states that “the capabilities of IPS products need to adapt to changing threats, and next-generation IPSs (NGIPSs) have evolved in ...
Read Blog
I had the privilege of speaking before the House Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies at a hearing titled “Examining the Cyber Threat to Critical Infrastructure and the American Economy.” I was pleased to have the opportunity to provide McAfee’s perspective on the threats that face our nation’s infrastructure, as well as provide ...
Read Blog