Category: Security Connected

Internet Security Issues & Information

Stay connected to the latest security news and catch up with the industry’s major players. Our experts cover a broad spectrum of useful security information including in-depth analysis, interviews, and best practices.

This week, the Intel Security product community gathers in Las Vegas, Nevada for the McAfee FOCUS 14 conference and exhibition.  In past years, I’ve taken the opportunity to lay out our vision for the evolution of the McAfee product and solutions portfolio, and the integration of this portfolio within the Security Connected Framework. This year’s […]

FOCUS 14 Today we are releasing to the world the Threat Intelligence Exchange (TIE), which, in collaboration with partners in the security industry, uses an open Data Exchange Layer (DXL) to rapidly share information between security sensors, controllers, and endpoints. The goal is to significantly improve the flow of information among your organization’s security products […]

Are you a McAfee Next Generation Firewall Advocate? Prove it by taking our NGFW treasure hunt challenge. Show us that you have what it takes to be an advocate for the next generation firewall that has tested successfully against 800 million AETs, by protecting enterprise networks with high-performance, intelligence-aware security controls supported by real-time updates […]

Small businesses often lack IT resources, yet are plagued by the same security issues that large corporations face in today’s increasingly complex threat landscape. Threats do not discriminate against company size, and neither should security; all companies deserve access to industry-leading protection. As a part of our mission to make security available to all, we’re […]

POODLE (Padding Oracle On Downgraded Legacy Encryption) is the latest Secure Sockets Layer (SSL) vulnerability to be uncovered. This vulnerability, which was discovered by researchers at Google, affects SSL 3.0, an older protocol which is still supported by browsers and web servers for backward compatibility. The vulnerability can be exploited by a hacker to obtain […]