Author: David Bull

David Bull Senior Product Marketing Manager David Bull oversees the messaging, positioning, packaging and pricing of McAfee’s Web and Email protection technologies, including both SaaS and on-premises form factors. With over 13 years of experience with both enterprise and SMB focused software, David joined McAfee through the acquisition of Secure Computing in 2008, where he held product management and product marketing positions driving the Unified Threat Management (UTM) product line. Prior to McAfee, David spent seven years in the enterprise content management space at Stellent (acquired by Oracle in 2006), serving in the sales, product marketing, and product management groups. He feels that one of the most rewarding and informative experiences within the security industry are engaging directly with current and potential McAfee customers and partners. David lives in the Denver, CO area and holds a B.S. in engineering from Iowa State University and an MBA from Colorado Christian University.

We hope that you’re stoked about expanding your knowledge about data exfiltration. In blog 4, we’re serving up another meaty topic—we’ll be looking at how exactly data walks out the door. Cybercriminals are exploiting the rapidly growing cloud computing trend. Thieves will go where the valuables are, so the cloud is their new frontier, but […]

Welcome to part 3 of our discussion on data exfiltration. Sit down and make yourself comfortable as we get inside the mind of data thieves and explore the types and formats of data that interest them most. Just in case there’s any doubt in your mind, our primary research findings, based on a survey of […]

Welcome to the second episode of our data exfiltration blog series. We’ll be taking a close look at the innocent and not-so-innocent actors who compromise your valuable corporate assets (no, we’re not talking about the Hollywood variety!). We’ll take a look at both external actors and internal actors and show what roles they play in […]

Call it what you will—data loss, data leakage, or data breach—theft of valuable corporate information assets has indisputably become a pervasive global problem. Many security professionals in every sector have had the misfortune of experiencing at least one data breach. According to a recent Intel Security study, the security pros we interviewed encountered an average […]

In Part I of this two-part blog series, we looked at concerns about loss of control and alternatives to all-or-nothing implementations discussed at our recent webinar, “Fireside Chat: Moving to Office 365 with Security in Mind.” In Part II, we address the question: “Can I trust Microsoft with my security?” Once again, security consultant and […]