Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security...
McAfee Labs provides important information about threats in a variety of ways, from our McAfee Global Threat Intelligence service that feeds into many of our products, to published Threat Reports, our...
How the consumerization of IT is affecting endpoint security What happens in Vegas may stay in Vegas, but what happens on your employees’ personal devices may not stay there. According to a recent survey of consumers around the world, conducted by MSI Research on behalf of Intel Security, almost 80% of respondents use their personal […]
Today, I am proud to share with you that our industry leading Network Security Platform (NSP) has been recognized in the leaders quadrant of the latest Gartner MQ for IPS for the 8th time in a row. In addition, McAfee was placed farthest on the right of the visionary axis. We believe this is a […]
The Gartner Magic Quadrant for Endpoint Protection Platforms (EPP) report is a vital tool in helping IT managers understand the market space and key solution providers. According to Gartner, “40% of organizations said they already use a single vendor for several of these functions, or are actively consolidating products. In particular, mobile data protection is […]
originally posted to Dark Reading: Intel Security Perspectives What too many of the year’s high-profile data breaches had in common. The only thing more depressing than the increasing frequency and growing scale of the cyber attacks in this year’s headlines was the consistency of key attributes across so many of the events. From the retailer […]
Few ideas have done more to focus and clarify IT security strategy than the concept of a cyber attack chain. The attack chain (or kill chain in the original formulation) was first described by Lockheed Martin analysts in a seminal 2011 paper. In a nutshell, the attack chain is a logical sequence used by most […]