Posts Tagged 'security management'
In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]
Driven by the misfortune of many, Cyber Threat Intelligence exchange and consumption is becoming more proliferated, accessible and standardized. Together with legacy security technologies like Firewall, IPS and Vulnerability Assessment tools, SIEMs have used threat intelligence initially for the most common use-case of detection and – unique for SIEM – as context during attacks. However, […]
Focus your energies on building a comprehensive security strategy and turning to experts for guidance. Panic: a sudden overwhelming fear that produces hysterical or irrational behavior and that often spreads quickly through a group. Puzzle: a thing that is difficult to understand or explain. A new year always brings with it a round of predictions. […]
We all know that 2014 has been marked by a huge uptick in high-profile data breaches in both the public and private sectors. What everyone is asking is this: How do we avoid a repeat of this situation in 2015? This is an especially important question in government. With the sensitivity of the data government […]
McAfee recently worked with the Atlantic Council to launch a report in Washington, D.C. on how cybersecurity can help enable e-voting. The launch event, which featured a diverse panel of speakers, was illuminating and is continuing to ignite interest from the media. We’re delighted, of course, but not just because of the possibilities for e-voting. Even […]