Tag: FOCUS

The 9th Annual McAfee FOCUS Conference kicked off the first week of November with incredible keynote speakers, inspiring breakout sessions and turbo talks, and a huge announcement! To the delight and surprise of attendees, SVP and GM Chris Young unveiled a new McAfee product brand. And keynote speakers Ashton Kutcher and Ted Koppel spoke about the ...
Read Blog
In my last post, I discussed the attributes of our adversaries, the drivers behind their activities, and their recent attack methodologies. I also discussed the threat defense efficacy curve, which illustrates how cyber defense capabilities decline in efficacy over time as attackers develop countermeasures to evade them. My FOCUS 16 keynote last week also explained ...
Read Blog
This week at the FOCUS’16 conference in Las Vegas, I shared perspectives on today’s changing threat landscape, how we must re-think cyber defense technologies, and McAfee's vision for thwarting the cyber-threats of tomorrow. In 2016, we saw significant cases of cyber activity from criminals, nation-states, and hacktivists. In each case, they’ve really upped their game. ...
Read Blog
This blog was written by Brian Dye. Writing from the FOCUS 16 Security Conference, Wed., Nov. 2 I just came out of one of the most energetic keynote sessions I have ever seen. Chris Young, who heads McAfee, mapped out a vision for the future of our company. It was overwhelming. I don’t need to ...
Read Blog
McAfee Security Innovation Alliance Partners Continue to Expand Our Open, Integrated Security Ecosystem Only a year ago, at our FOCUS 15 event, we announced our new strategy centered on an integrated, open security system—powered by a connected architecture across McAfee and third-party products. Since then, our McAfee Security Innovation Alliance partners have been collaborating closely ...
Read Blog
The security industry has, for years, been developing technologies to secure our applications and operating systems. 2015 was the year, however, I feel hardware vulnerabilities truly became real. We saw multiple instances of attackers using hardware, firmware, and BIOS as an element of their attack, from Rowhammer exploiting DRAM to the Equation Group showcasing vulnerabilities ...
Read Blog
It takes a village. With today’s vast cybercriminal network churning out sophisticated attacks by the minute, it’s virtually impossible for any single security solution to combat today’s threats alone. For years, organizations have resorted to layering security technologies and deploying best-of-breed point solutions at various control points, trying to achieve better protection. However, the lack ...
Read Blog