Author: David Bull

David Bull Senior Product Marketing Manager David Bull oversees the messaging, positioning, packaging and pricing of McAfee’s Web and Email protection technologies, including both SaaS and on-premises form factors. With over 13 years of experience with both enterprise and SMB focused software, David joined McAfee through the acquisition of Secure Computing in 2008, where he held product management and product marketing positions driving the Unified Threat Management (UTM) product line. Prior to McAfee, David spent seven years in the enterprise content management space at Stellent (acquired by Oracle in 2006), serving in the sales, product marketing, and product management groups. He feels that one of the most rewarding and informative experiences within the security industry are engaging directly with current and potential McAfee customers and partners. David lives in the Denver, CO area and holds a B.S. in engineering from Iowa State University and an MBA from Colorado Christian University.

One Phish, Two Phish: How Cybercriminals Reel in 80% of Users with Deceptive Emails We’ve all seen it. The innocent-looking message from what appears to be your bank, reminding you that it’s time to update your account information with the simple click of a link and the entering of some personal information. Everything looks in […]

New year = new attack vectors. With the holidays in full swing and 2014 coming to a close, McAfee Labs has produced their latest Threats Report. In it, key security predictions for the coming year are discussed, including forecasts around increases in cyber espionage, more frequent attacks on the Internet of Things, and the ‘explosion’ […]

The Information Security™ magazine and SearchSecurity.com™ recently announced the winners of the 2014 Readers’ Choice Awards. We are honored McAfee Email Protection was named as a 2014 Reader’s  Choice Award winner in the Email Security category, and excited that readers recognized the solution for its targeted phishing attack protection, ability to enhance security for hosted […]

Phishing attacks exploit the often weakest link in cyber defense—human behavior. Bypassing our best judgment can be as simple as creating urgency with a fake bank notice, or complex as assuming the persona of a known business partner – just to steal our information. Numerous high-profile breaches such as the theft of credit card data […]

If there’s one term that can make a CISO squirm whenever mentioned, it’s “Shadow IT.” After all, when tasked with securing an enterprise-scale network, most CISOs frown on business units and employees procuring their own tech solutions — like Dropbox, Flickr, or Gmail — without notifying IT for proper vetting. But that discomfort isn’t stopping […]