Feeds & Podcasts

Enterprise Blogs

Meet the Bloggers

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

Cloud Security

Learn “best practices” around Cloud Security from McAfee’s leading cloud experts. From protecting data in the cloud to security you can learn how to build a bridge between your enterprise and the cloud.

Posts in Cloud Security

Release Announcement: McAfee Email Gateway 7.0

Wednesday, December 21, 2011 at 2:25pm by Tim Roddy
Tim Roddy

With the release of McAfee Email Gateway (MEG) version 7, McAfee now offers a single email solution that combines the best features of the Secure Computing Email Gateway (IronMail) platform with the McAfee Email and Web Security (EWS) appliance platform, to provide a more fully featured product, deployable on a wider range of platforms. MEG Read more…

Tags: , ,

Modest Musings From Cloud Expo 2011

Friday, November 11, 2011 at 10:00am by Scott Chasin
Scott Chasin

I am constantly intrigued by the people who attend large, IT industry events like last month’s McAfee FOCUS 11 and the Cloud Expo in Santa Clara from where I am writing this note.  Watching IT people at all levels, overhearing their conversations, and speaking with them reinforces that they are all super-driven to understand and Read more…

Tags: , , ,

15 Minutes With… Ben Andrew

Wednesday, November 9, 2011 at 9:54am by Simon Hunt
Simon Hunt

Welcome to “15 minutes with” – an occasional contribution between Simon Hunt, CTO Endpoint Security and the movers-and-shakers within McAfee’s technical community. This week on the stand is Ben Andrew, Senior Product Manager for Virtualization Security. So Ben, care to tell us how long you’ve been with McAfee, and what you’ve been involved in? Hi Read more…

Security Can Help You Move To The Cloud

Monday, November 7, 2011 at 11:18am by Marc Olesen
Marc Olesen

If you’re reading this, you probably know a good deal about cloud computing because it’s probably part of your business. Or, you’re reading this because you’ve heard about the cloud and about the business benefits you can recognize by moving to the cloud. Regardless of your background, if you’re like the majority of business leaders, Read more…

Tags: ,

Urchins, LizaMoons, Tigers, and Bears

Friday, October 21, 2011 at 11:44am by Jim Walter
Jim Walter

In early April, I wrote about the famed “LizaMoon” SQL-injection attacks. I said it then, and I’ll say it again now: SQL-injection (SQLi) attacks are a constant. Some of these attacks are more visible than others.  Some adversaries find intelligent ways to hide their tracks so as not to splatter evidence of their misdeeds all over various search Read more…

Tags: , , , , , , , , , ,

I Can See the Evolution and It’s Exciting

Monday, October 17, 2011 at 11:48am by Marc Olesen
Marc Olesen

Evolution is usually something we see after hundreds of years of gradual change.  But with the volume and breadth of technological advancements in the last decade, the process of evolution continues to speed up.  As a senior vice president and general manager of McAfee Content & Cloud Security, I am really fortunate to be in Read more…

Tags: , ,

Computing and content and cloud, oh my!

Friday, July 22, 2011 at 2:43pm by Callie Skokos
Callie Skokos

Sometimes progress can be scary. It was 1986.  I was a legal intern at Merrill Lynch working my way through college.  At that time, there was no public Internet – and desktop PCs were uncommon in the workplace.  In fact, most of the tasks that were performed by my team in the legal department were Read more…

Tags: ,

Choosing a CSP: Confidence in Risk

Monday, May 23, 2011 at 10:59am by Raj Samani
Raj Samani

Maybe it’s just me, but I had this assumption that Cloud computing would be one of the most popular online search terms. When I found the list of top ten most searched items, I was slightly surprised to find celebrities that a) I had never heard of and b) turned out to have no involvement with Read more…

Tags: , ,

Traveling Back To The Year 2000

Wednesday, May 11, 2011 at 9:30am by Callie Skokos
Callie Skokos

“I’ll just use the Internet. It’s brilliant.” That’s what a good friend of mine said in the winter of 2000 when he was explaining how he was going to revolutionize the business of accounting.  It was his brainchild – to provide restaurants with a service that would allow operators to transmit their financials securely over Read more…

Tags: , ,

Now Entering Cloud City

Wednesday, April 27, 2011 at 10:03am by Callie Skokos
Callie Skokos

Once considered a trend, cloud computing continues to grow.  And, we’re not just talking about growth in thought leadership circles, but growth in actual physical size.  Yes, the cloud is going urban.  Within two years, China’s proposed cloud city will be physical proof that this computing model truly has a stronghold on our technological life.  Read more…

Tags: , ,