#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity
Data classification is an important – and very challenging – problem. It is all about tagging your data so that it can be found quickly and efficiently. It is part of the Information Lifecycle Management process and enables organizations answer the following questions. – What data types are available? – Where are certain Read more…
Tags: Data Classification, Data Protection, DLP, McAfee Data Loss Prevention
Read all posts in Data Protection
The Payment Card Industry (PCI) Security Standards Council is an open global forum, launched in 2006, responsible for the development, management, education and awareness of the PCI Security Standards – including retail standards for data security, payment application data, and pin transactions. As we move forward through our recent economic ups and downs, the PCI Read more…
Tags: PCI Compliance, Security Connected Reference Architecture, SMB
Read all posts in Security Connected
Real-time situational awareness is vital to securing global cyber systems and helping to protect national security. A global policy is needed which enables companies to collaborate with governments to leverage innovative technology solutions that combine and leverage disparate datasets to expedite the identification of data patterns and indicators which can be used to identify potential Read more…
Tags: Cyber Intelligence Sharing and Protection Act of 2011, Cybercrime, identify potential cyber-threats, identity theft
Read all posts in Public Sector
McAfee has developed an Anti Virus solution to protect our customer’s data storage devices. Jim Waggoner, CISSP, Director of Product Management for McAfee discusses the new McAfee AV solution developed for NetApp ONTAP 8.1 which is pre loaded on every NetApp ONTAP device. Read about this exciting new development at the NetApp Community Forum! How to Read more…
Read all posts in Critical Infrastructure Protection
There are many kinds of risk: operational, legal, and reputational risk. Most large enterprise IT teams are comfortable and proficient at measuring operational risk. It features in reports as minutes of downtime, incidents of endpoint reimages, number of patches installed, hours of overtime. Legal risk isn’t that hard to handle, either. IT can draw on Read more…
Tags: legal risk, operational risk, reputational risk
Read all posts in Data Center
With the release of McAfee Email Gateway (MEG) version 7, McAfee now offers a single email solution that combines the best features of the Secure Computing Email Gateway (IronMail) platform with the McAfee Email and Web Security (EWS) appliance platform, to provide a more fully featured product, deployable on a wider range of platforms. MEG Read more…
Tags: global threat intelligence, McAfee Email Gateway 7.0, protection
Read all posts in Cloud Security
Today, McAfee completed its acquisition of privately held NitroSecurity, an enterprise-class security and information management (SIEM) security vendor. I’ll be talking more about this acquisition with Ken Levine, chairman, president and chief executive officer, NitroSecurity, during a McAfee Webcast December 7 at 9:00 am Pacific Time. To register, please visit http://events.mcafee.com/forms/11Q4McAfeeAcquiresNitrowebcast. NitroSecurity is a leader Read more…
Tags: NitroSecurity, security management, SIEM
Read all posts in Management
While most apps on the market are legitimate, mobile devices have become a targeted platform for malware. It’s becoming more and more common for cybercriminals to corrupt a legitimate app with hidden malicious functionality. These illegitimate and compromised mobile apps are designed to steal information from smartphones, or to send out expensive text messages without Read more…
Tags: App Alert, Bad Apps, McAfee, McAfee Mobile Security
Read all posts in Consumer
I was in Madrid speaking at a conference a couple of months ago, and arriving after one of my favorite trans-Atlantic flights (you know the ones, where the ratio of screaming children to adults is not conducive to rest or even playing Angry Birds) I was excited to take one of the citi-cabs which have Read more…
Tags: automotive
Read all posts in CTO
The Iranian government on Monday said it was targeted by a new computer virus dubbed “Stars.” The report came from the director of Iran’s Passive Defense Organization through the country’s Mehr News Agency. Global media subsequently picked up the story, which has now been covered by the Associated Press, BBC, Reuters and many others. Stars would Read more…
Tags: critical infrastructure, Cybercrime, Endpoint Protection, enterprise, Stuxnet
Read all posts in System Endpoint
FOCUS 10 is just a week away and we’re so excited to gather with our best customers and partners for McAfee’s third annual security conference (Oct. 12-14). Over 2,200 delegates are expected to attend — making FOCUS 10 our largest gathering ever! FOCUS truly is a unique opportunity for the McAfee community to come together Read more…
Tags: enterprise, Focus, Network Security
Read all posts in Support
A new weekly series from me on the McAfee SME blog: Myth: Chicken soup and hot toddies are effective treatments for the flu or colds. Fact: A bowl of chicken soup is a popular home remedy. While hot liquids can soothe a scratchy throat or cough, chicken soup has no special power to cure the Read more…
Read all posts in SMB
I am very excited to announce a critical milestone in the growth of our Security-as-a-Service business. McAfee has agreed to acquire MX Logic. MX Logic is a leading provider of cloud-based security services including email and web filtering, and email archiving and continuity. Adding MX Logic’s solutions to McAfee will provide us with the most Read more…
Tags: Acquisition, Mid-Market, Security-as-a-Service
Read all posts in SaaS
Tim Greene at Network World just issued a nice story in support of the notion that NAC can be a sort of ‘backstop’ to security tools. NAC is supposed to do a lot of things and once it’s installed, customers are finding that NAC often does even more than they bargained for. For instance, NAC Read more…
Tags: NAC
Read all posts in NAC
Enterprise Blogs