Comprehensive Malware Protection: It’s a Beautiful Thing!
As a general rule, technology companies do a very good job at product marketing–figuring out how the product they want to sell will solve a very specific customer problem. But seldom do they take a...
View ArticleJoin @McAfeeBusiness for #SecChat 3/21: Tomorrow’s Malware Threats
Predicting what malware will look like five years from now requires more than a crystal ball. In order to fully understand future threats and challenges, you need a finger on the broader pulse of...
View ArticleMarch #SecChat Recap: Future of Malware Threats
View the story “#SecChat Recap: Future of Malware Threats” on Storify
View ArticleBeat Malware Through Integration
At RSA Conference in late February, McAfee announced the acquisition of sophisticated sandboxing technology and 38 product enhancements that together extend McAfee’s lead in protection against malware....
View ArticleEnd-to-end Protection Thwarts Malware
Recently, I wrote about the meaning of integration as it relates to protection against malware, why an integrated solution is important, and what is needed to deliver an integrated solution. Today, I’m...
View ArticleThe Economic Impact of Cybercrime and Cyber Espionage
Many estimates of the cost of cybercrime have been quoted publicly – ranging from a few billion to a trillion U.S. dollars globally on an annual basis – but most of these estimates are based on limited...
View ArticleBlack Hat 2013 Recap: Advanced Malware Discussions
It’s been a great week at Black Hat USA 2013. There’s been a lot of buzz around the McAfee booth and our team had lively discussions on the topic of advanced malware. Cybercrime is clearly getting more...
View ArticleCombating Advanced Malware: McAfee Survey at Black Hat USA 2013
The final survey results are in from Black Hat USA 2013 and it’s clear: IT professionals are frustrated that so much time is spent combating advanced malware. Many professionals devote half their...
View ArticleWelcome to the New McAfee Labs Quarterly Threats Report
Starting with the McAfee Labs Threats Report: Fourth Quarter 2013 posted today, we’re taking a fresh approach to its format, content, and supporting materials. We had several things in mind when...
View ArticleChecking the Pulse of McAfee Labs Threats Reports
In March, we wrote about changes that we were making to the McAfee Labs Threats Reports. Those changes included both format and content improvements. We wanted to make the Threats Reports more...
View ArticleMcAfee Labs Threats Report Takes Another Step Forward
In September, we invited readers of the McAfee Labs Threats Report to complete a short survey and let us know what they think about the report. Here’s what we learned. Readers are most interested in...
View ArticleNew Year, New Cyberthreats: What’s in Store for 2015? January #SecChat
Unfortunately, the good guys aren’t the only ones with resolutions for the New Year. From cyber espionage to increasingly unforgiving ransomware, non-Windows malware to attacks on the Internet of...
View ArticleVerizon Report Foreshadows Breaches Originating With IoT Devices
Today, Verizon released its 2015 Data Breach Investigations Report (DBIR). As Verizon noted in the Appendix D discussion of the security of the Internet of Things (with significant contributions from...
View ArticleVerizon Report Foreshadows Breaches Originating With IoT Devices, Part 2
On April 14, Verizon released its 2015 Data Breach Investigations Report (DBIR). Also that day, McAfee Labs posted a blog expanding on the DBIR’s Appendix D discussion of the security of the Internet...
View ArticleVerizon Report Foreshadows Breaches Originating With IoT Devices, Part 3
This post was written with the invaluable assistance of Steve Watson of Intel. On April 14, Verizon released its 2015 Data Breach Investigations Report (DBIR). Also that day, McAfee Labs posted a blog...
View ArticleVerizon Report Foreshadows Breaches Originating With IoT Devices, Part 4
This post was written with the invaluable assistance of Steve Watson of Intel. On April 14, Verizon released its 2015 Data Breach Investigations Report (DBIR). Since then, McAfee Labs posted three...
View ArticleMcAfee Labs Threats Report Highlights Surge in Ransomware, Flash Exploits,...
Intel Security today released the McAfee Labs Threats Report: May 2015. Along with the usual compilation of threats statistics, it focuses on three key topics: A surge in powerful and clever ransomware...
View ArticleComprehensive Malware Protection: It’s a Beautiful Thing!
As a general rule, technology companies do a very good job at product marketing–figuring out how the product they want to sell will solve a very specific customer problem. But seldom do they take a...
View ArticleJoin @McAfeeBusiness for #SecChat 3/21: Tomorrow’s Malware Threats
Predicting what malware will look like five years from now requires more than a crystal ball. In order to fully understand future threats and challenges, you need a finger on the broader pulse of...
View ArticleMarch #SecChat Recap: Future of Malware Threats
http://storify.com/McAfeeBusiness/secchat-recap-tomorrow-s-malware-threats The post March #SecChat Recap: Future of Malware Threats appeared first on McAfee.
View Article
More Pages to Explore .....