Author: David Bull

David Bull Senior Product Marketing Manager David Bull oversees the messaging, positioning, packaging and pricing of McAfee’s Web and Email protection technologies, including both SaaS and on-premises form factors. With over 13 years of experience with both enterprise and SMB focused software, David joined McAfee through the acquisition of Secure Computing in 2008, where he held product management and product marketing positions driving the Unified Threat Management (UTM) product line. Prior to McAfee, David spent seven years in the enterprise content management space at Stellent (acquired by Oracle in 2006), serving in the sales, product marketing, and product management groups. He feels that one of the most rewarding and informative experiences within the security industry are engaging directly with current and potential McAfee customers and partners. David lives in the Denver, CO area and holds a B.S. in engineering from Iowa State University and an MBA from Colorado Christian University.

Now, we’ve arrived at the moment you’ve all been waiting for—the seventh and final blog post in our series. You’ve already absorbed a great deal many facts, figures, and truths about the who, what, where, why, and how of data exfiltration. Are you ready for the big reveal? In this blog, we’ll talk actions you […]

Back in blog 5, we touched lightly on data exfiltration from traditional networks and the cloud. To refresh your memory, our primary research tells us that a third of data is being taken from the cloud and two thirds from traditional networks. We’ll be looking into this topic more deeply to see what it means for […]

As you found out from our previous blog, a great deal of data goes out the door through both physical and electronic means. In this blog, we’ll address some of the more sophisticated electronic data exfiltration techniques used by cyberthieves. Many of these bad actors are really smart, innovative people with a lot of time […]

We hope that you’re stoked about expanding your knowledge about data exfiltration. In blog 4, we’re serving up another meaty topic—we’ll be looking at how exactly data walks out the door. Cybercriminals are exploiting the rapidly growing cloud computing trend. Thieves will go where the valuables are, so the cloud is their new frontier, but […]

Welcome to part 3 of our discussion on data exfiltration. Sit down and make yourself comfortable as we get inside the mind of data thieves and explore the types and formats of data that interest them most. Just in case there’s any doubt in your mind, our primary research findings, based on a survey of […]