Tag: critical infrastructure protection

Talking with customers during the past few months, the key topics and questions we heard were all about targeted attacks, threat intelligence, and security information and event management (SIEM). However, there seems be a myth that “once we have SIEM, we will have visibility into threats”—as if SIEM will give us all the answers. To ...
Read Blog
The advertising slogan “crunchy on the outside and chewy on the inside” has been used by companies to market candy, cookies, and even tacos. The slogan is particularly relevant given some of the predictions in the McAfee Labs 2014 Predictions Report. Specifically, the crunchy/chewy model illuminates the prediction that deals with the expectations of McAfee ...
Read Blog
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In this and related posts, McAfee Labs researchers offer their views of new and evolving threats we expect to see in the coming year. This article was written by Ramnath Venugopalan. We foresee three broad threat ...
Read Blog
I hope you enjoyed a great summer vacation with your families and loved ones. Personally I had a wonderful and sunny holiday with my family in the south of Spain. Do you remember those days when the summers were quiet and peaceful?  Where almost nothing notable was happening? I am afraid that those days are ...
Read Blog
In system engineering, and good system design begins with establish good “requirements”.  Requirements are not just technical and engineering features, they can also be operational (what are the designed configuration features,  what is the required uptime, downtime or service interval, etc) and requirements can be business-orient related to regulatory obligations (privacy, safety) or internally mandated ...
Read Blog
Cloud computing continues to be a hot topic. But so what if people are talking about it, who is actually adopting it? One of the questions I have been asking myself is, ‘Will cloud be adopted for critical infrastructure? And what is the security perspective on this? Naturally a blog to answer that question will ...
Read Blog