Author: Ed Metcalf

Ed Metcalf As Director of Product Marketing, Ed brings more than 20 years of security and technology industry experience to his role at Intel Security, where he’s leading the endpoint security product marketing strategy while championing the voice of the customer. His mission is to provide the glue that links together the market needs, what to build and how to go-to-market. Before Intel Security, Ed worked for Hewlett Packard, Tripwire and other technology startups. He is a graduate of Oregon State University with degree in business management. In Ed’s limited spare time he is a dedicated family man with three daughters and an avid sporting enthusiast.

You heard it at Intel Security’s 2015 FOCUS event, and you’ll hear it at the 2016 RSA Conference: it’s time to change the game in security. With the rising volume of complex attacks, 2016 is the year for infosec pros to evolve their approach, taking a more proactive method to identifying, hunting, assessing and prioritizing […]

Do you remember life before high speed internet and the smartphone? Those of us who do might look back on the days of dial-up and clunky cell phones with nostalgia, but couldn’t imagine ever using them again. Since then, technology has continued to improve our lives and increase our efficiency in many different ways. Much […]

There’s no doubt the threat landscape is a complex one. Each month brings a new example of a targeted attack against an organization that was previously considered “invulnerable.” This begs the question, “What went wrong?” With today’s targeted attacks, there’s more importance than ever before to review your infrastructure to ensure you have a comprehensive […]

Being friendly and social can enhance your career, strengthen friendships and overall lead to a happier life. However, we need to be mindful that those social interactions don’t make it easy for cyber criminals to gain valuable sensitive or personal information about our lives.  In a social engineering attack, an attacker uses human interaction (social […]

In the “Verizon 2013 Data Breach and Investigations Report” 80% of cases (examined by Verizon) a breach wasn’t detected for at least weeks, if not months or years.  Once a detection was made the data suggests that in 79% of cases it took days, weeks or months to contain, which is significant because an attacker […]