#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity
Stay connected to the latest security news and catch up with the industry’s major players. Written by McAfee experts, this blog contains a broad spectrum of useful security information, including in-depth analysis, interviews, and best practices.
The Payment Card Industry (PCI) Security Standards Council is an open global forum, launched in 2006, responsible for the development, management, education and awareness of the PCI Security Standards – including retail standards for data security, payment application data, and pin transactions. As we move forward through our recent economic ups and downs, the PCI Read more…
Tags: PCI Compliance, Security Connected Reference Architecture, SMB
In “Six Social Media Trends for 2012”, David Armano explores the evolution of social media into social business. “Social media,” says Armano, “continues to move forward towards business integration.” According to Forrester’s Stephen Mann, the increasing ubiquity of mobile devices in enterprise environments is facilitating this trend. A joint Booz Allen/Buddy Media study found that Read more…
Tags: 2012, mobile security, social business, social media
I’ve always felt uncomfortable giving out my zip code to retailers. Now, a Massachusetts ruling has sent a clear message to businesses by concluding that zip codes are considered personally identifiable information (PII), which limits the way those numbers can be used and recorded during credit card transactions. In this case involving a large craft Read more…
Social media platforms have become ubiquitous in recent years, not only because connections are easy to make and conversations are rapid and short – but there is also the universal thrill of finding a great piece of content and sharing it with hundreds of thousands of online followers. This is especially true when that information Read more…
Tags: Security Connected Reference Architecture, social media
Datacenters continue to be the heart of IT in many organizations and are associated with tasks as varied as generating revenue, storing sensitive data, and providing business-critical services. Because of their role, datacenters have historically been a target of attack, and a focus area for several regulatory mandates. Datacenters are also undergoing a fundamental change Read more…
McAfee is embarking on an expanded initiative to accommodate the ever-changing security and technology landscape. The Security Connected Reference Architecture is specifically designed to help customers integrate multiple products, services, and partnerships that result in centralized, efficient, and effective risk mitigation. These resources and tools provide a clear path from security concept to implementation, and Read more…
Last month, McAfee Labs released its 2012 threat predictions report, taking its annual stab at predicting the course of our industry in the coming year. The McAfee researchers foresaw several new scenarios and significant evolutions in some of the most established threat vectors, including industrial threats, embedded hardware, hacktivism, virtual currency systems and more. During Read more…
In continuation of our series of discussions on the new SEC Guidance, I was joined by Steven Fox, CISSP and QSA. He is a security architecture and engineering advisor at the U.S. Department of the Treasury. Mr. Fox brings a cross-disciplinary perspective to the practice of information security, combining his experience as a security consultant, Read more…
Tags: SEC Guidance
The New Year is always a time for looking back on the past, and more importantly, looking forward and reflecting on the positive changes we want or need to make in the coming year. McAfee predicts that 2012 will continue to see cybercriminals improving their toolkits in many areas that pose a material threat to Read more…
Tags: cloud security, cyber security awareness, mobile security, new year resolution
Earlier this week, I was able to sit down with one of our McAfee blog contributors, Leon Erlanger, for a podcast on SEC Security Guidance. Leon published a blog post earlier this month with his thoughts on the new guidance, and you can listen to his podcast interview at the end of this post. Leon, Read more…
Tags: SEC Guidance
Posts in Security Connected