Feeds & Podcasts

Enterprise Blogs

Meet the Bloggers

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

Enterprise

Subscribe to the Enterprise blog.

Enterprise Blogs

Data Protection: Using DLP to Categorize Your Data and Reduce Risk

Wednesday, January 25, 2012 at 4:41pm by Nikfar Khaleeli
Nikfar Khaleeli

Data classification is an important – and very challenging – problem. It is all about tagging your data so that it can be found quickly and efficiently.  It is part of the Information Lifecycle Management process and enables organizations answer the following questions.           – What data types are available?           – Where are certain Read more…

Tags: , , ,

Read all posts in Data Protection

Security Connected: McAfee Reference Architecture: Obtaining Benefits from PCI

Wednesday, January 25, 2012 at 3:38pm by Kim Singletary
Kim Singletary

The Payment Card Industry (PCI) Security Standards Council is an open global forum, launched in 2006, responsible for the development, management, education and awareness of the PCI Security Standards – including retail standards for data security, payment application data, and pin transactions. As we move forward through our recent economic ups and downs, the PCI Read more…

Tags: , ,

Read all posts in Security Connected

Public Sector: Cyber Intelligence Sharing and Protection Act

Friday, January 6, 2012 at 1:53pm by Dr. Phyllis Schneck
Dr. Phyllis Schneck

Real-time situational awareness is vital to securing global cyber systems and helping to protect national security.  A global policy is needed which enables companies to collaborate with governments to leverage innovative technology solutions that combine and leverage disparate datasets to expedite the identification of data patterns and indicators which can be used to identify potential Read more…

Tags: , , ,

Read all posts in Public Sector

Critical Infrastructure Protection: McAfee AV Solution Developed for NetApp ONTAP 8.1

Friday, January 6, 2012 at 12:00pm by DThakkar
DThakkar

McAfee has developed an Anti Virus solution to protect our customer’s data storage devices. Jim Waggoner, CISSP, Director of Product Management for McAfee discusses the new McAfee AV solution developed for NetApp ONTAP 8.1 which is pre loaded on every NetApp ONTAP device. Read about this exciting new development at the NetApp Community Forum! How to Read more…

Read all posts in Critical Infrastructure Protection

Data Center: Privacy Matters Blog Series: Quantifying Reputational Risk

Friday, January 6, 2012 at 10:00am by Michelle Dennedy
Michelle Dennedy

There are many kinds of risk: operational, legal, and reputational risk. Most large enterprise IT teams are comfortable and proficient at measuring operational risk. It features in reports as minutes of downtime, incidents of endpoint reimages, number of patches installed, hours of overtime. Legal risk isn’t that hard to handle, either. IT can draw on Read more…

Tags: , ,

Read all posts in Data Center

Cloud Security: Release Announcement: McAfee Email Gateway 7.0

Wednesday, December 21, 2011 at 2:25pm by Tim Roddy
Tim Roddy

With the release of McAfee Email Gateway (MEG) version 7, McAfee now offers a single email solution that combines the best features of the Secure Computing Email Gateway (IronMail) platform with the McAfee Email and Web Security (EWS) appliance platform, to provide a more fully featured product, deployable on a wider range of platforms. MEG Read more…

Tags: , ,

Read all posts in Cloud Security

Management: McAfee Completes Acquisition Of NitroSecurity

Thursday, December 1, 2011 at 2:00am by Stuart McClure
Stuart McClure

Today, McAfee completed its acquisition of privately held NitroSecurity, an enterprise-class security and information management (SIEM) security vendor. I’ll be talking more about this acquisition with Ken Levine, chairman, president and chief executive officer, NitroSecurity, during a McAfee Webcast December 7 at 9:00 am Pacific Time. To register, please visit http://events.mcafee.com/forms/11Q4McAfeeAcquiresNitrowebcast. NitroSecurity is a leader Read more…

Tags: , ,

Read all posts in Management

Consumer: McAfee Releases Top Five Tips to Avoid Bad Apps

Monday, November 14, 2011 at 12:05am by John Dasher
John Dasher

While most apps on the market are legitimate, mobile devices have become a targeted platform for malware. It’s becoming more and more common for cybercriminals to corrupt a legitimate app with hidden malicious functionality. These illegitimate and compromised mobile apps are designed to steal information from smartphones, or to send out expensive text messages without Read more…

Tags: , , ,

Read all posts in Consumer

CTO: Piggybacking WiFi at 60mph…

Wednesday, September 7, 2011 at 11:29am by Simon Hunt
Simon Hunt

I was in Madrid speaking at a conference a couple of months ago, and arriving after one of my favorite trans-Atlantic flights (you know the ones, where the ratio of screaming children to adults is not conducive to rest or even playing Angry Birds) I was excited to take one of the citi-cabs which have Read more…

Tags:

Read all posts in CTO

System Endpoint: Is A New Virus Hitting In Iran?

Monday, April 25, 2011 at 4:05pm by Joris Evers
Joris Evers

The Iranian government on Monday said it was targeted by a new computer virus dubbed “Stars.” The report came from the director of Iran’s Passive Defense Organization through the country’s Mehr News Agency. Global media subsequently picked up the story, which has now been covered by the Associated Press, BBC, Reuters and many others. Stars would Read more…

Tags: , , , ,

Read all posts in System Endpoint

Support: Welcome to FOCUS 10

Tuesday, October 5, 2010 at 7:16pm by Barry McPherson
Barry McPherson

FOCUS 10 is just a week away and we’re so excited to gather with our best customers and partners for McAfee’s third annual security conference (Oct. 12-14). Over 2,200 delegates are expected to attend — making FOCUS 10 our largest gathering ever! FOCUS truly is a unique opportunity for the McAfee community to come together Read more…

Tags: , ,

Read all posts in Support

SMB: Fact or Fiction?

Tuesday, September 8, 2009 at 5:42pm by Editor
Editor

A new weekly series from me on the McAfee SME blog: Myth: Chicken soup and hot toddies are effective treatments for the flu or colds. Fact: A bowl of chicken soup is a popular home remedy. While hot liquids can soothe a scratchy throat or cough, chicken soup has no special power to cure the Read more…

Read all posts in SMB

SaaS: McAfee to acquire MX Logic

Friday, July 31, 2009 at 1:39pm by Marc Olesen
Marc Olesen

I am very excited to announce a critical milestone in the growth of our Security-as-a-Service business. McAfee has agreed to acquire MX Logic. MX Logic is a leading provider of cloud-based security services including email and web filtering, and email archiving and continuity. Adding MX Logic’s solutions to McAfee will provide us with the most Read more…

Tags: , ,

Read all posts in SaaS

NAC: Network Risk Control

Thursday, November 6, 2008 at 8:24pm by Dan Wolff
Dan Wolff

Tim Greene at Network World just issued a nice story in support of the notion that NAC can be a sort of ‘backstop’ to security tools. NAC is supposed to do a lot of things and once it’s installed, customers are finding that NAC often does even more than they bargained for. For instance, NAC Read more…

Tags:

Read all posts in NAC