Stay connected to the latest security news and catch up with the industry’s major players. Our experts cover a broad spectrum of useful security information including in-depth analysis, interviews, and best practices.
Intel Security Innovation Alliance technology partnering program comprises more than 150 ISV security partners who deliver tightly integrated, differentiated, and lab-tested solutions that enhance, augment, strengthen, and broaden the core functionality of Intel Security products. The Intel Security Innovation Alliance is a key building block supporting an ecosystem security model that drives positive business outcomes […]
For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were a few bridges here and there but the various islands remained largely inaccessible. It became clear, however, that in this era of rapidly evolving and advanced threats, we needed to find a way to build […]
Rethinking Current Endpoint Security Strategies (Part 2) Successful endpoint security strategies must address numerous requirements – from staff and policy to the right technology mix and integration. The first webcast in this series outlined the requirements. This webcast will dive deeper into new approaches and technologies to prevent, detect and respond to threats and how […]
Virtualization is no longer just a buzzword for large IT enterprises—it’s become a top priority across most business sectors. If you’re curious to see it work in action, look to the success of this large warehouse-style retailer. Through McAfee Solutions, the enterprise successfully virtualized 98 percent of its IT infrastructure, an impressive number for any […]
At the 2016 Black Hat security conference, automotive cybersecurity researchers Charlie Miller and Chris Valasek demonstrated new ways to hack the 2014 Jeep Cherokee they compromised at the conference the year before. They were able to stop the vehicle from any speed in seconds, manipulate the steering so as to crash the car, and take control […]