Feeds & Podcasts

Enterprise Blogs

Meet the Bloggers

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

Security Connected

Stay connected to the latest security news and catch up with the industry’s major players. Written by McAfee experts, this blog contains a broad spectrum of useful security information, including in-depth analysis, interviews, and best practices.

Posts in Security Connected

McAfee Reference Architecture: Obtaining Benefits from PCI

Wednesday, January 25, 2012 at 3:38pm by Kim Singletary
Kim Singletary

The Payment Card Industry (PCI) Security Standards Council is an open global forum, launched in 2006, responsible for the development, management, education and awareness of the PCI Security Standards – including retail standards for data security, payment application data, and pin transactions. As we move forward through our recent economic ups and downs, the PCI Read more…

Tags: , ,

2012 Trends in Social Business

Tuesday, January 24, 2012 at 2:10pm by Steven Fox
Steven Fox

In “Six Social Media Trends for 2012”, David Armano explores the evolution of social media into social business. “Social media,” says Armano, “continues to move forward towards business integration.”  According to Forrester’s Stephen Mann, the increasing ubiquity of mobile devices in enterprise environments is facilitating this trend. A joint Booz Allen/Buddy Media study found that Read more…

Tags: , , ,

Massachusetts Court Rules Zip Codes are PII

Wednesday, January 18, 2012 at 3:21pm by Kim Singletary
Kim Singletary

I’ve always felt uncomfortable giving out my zip code to retailers. Now, a Massachusetts ruling has sent a clear message to businesses by concluding that zip codes are considered personally identifiable information (PII), which limits the way those numbers can be used and recorded during credit card transactions. In this case involving a large craft Read more…

Tags: ,

McAfee Reference Architecture: Securely Enabling Social Media

Wednesday, January 18, 2012 at 12:33pm by Kim Singletary
Kim Singletary

Social media platforms have become ubiquitous in recent years, not only because connections are easy to make and conversations are rapid and short – but there is also the universal thrill of finding a great piece of content and sharing it with hundreds of thousands of online followers. This is especially true when that information Read more…

Tags: ,

McAfee Reference Architecture: Protecting the Datacenter

Monday, January 16, 2012 at 10:39am by Brian Contos
Brian Contos

Datacenters continue to be the heart of IT in many organizations and are associated with tasks as varied as generating revenue, storing sensitive data, and providing business-critical services. Because of their role, datacenters have historically been a target of attack, and a focus area for several regulatory mandates.  Datacenters are also undergoing a fundamental change Read more…

Tags: ,

Meeting Enterprise Challenges with McAfee Security Connected Framework

Friday, January 13, 2012 at 8:30am by Brian Contos
Brian Contos

McAfee is embarking on an expanded initiative to accommodate the ever-changing security and technology landscape. The Security Connected Reference Architecture is specifically designed to help customers integrate multiple products, services, and partnerships that result in centralized, efficient, and effective risk mitigation. These resources and tools provide a clear path from security concept to implementation, and Read more…

Tags: ,

Join @McAfeeBusiness for #SecChat this Thursday 1/19: Share Your 2012 Threat Predictions

Thursday, January 12, 2012 at 4:37pm by Brian Contos
Brian Contos

Last month, McAfee Labs released its 2012 threat predictions report, taking its annual stab at predicting the course of our industry in the coming year. The McAfee researchers foresaw several new scenarios and significant evolutions in some of the most established threat vectors, including industrial threats, embedded hardware, hacktivism, virtual currency systems and more. During Read more…

Tags: ,

SEC Guidance: A Cross-Disciplinary Perspective by Steven Fox

Tuesday, January 10, 2012 at 10:14am by Brian Contos
Brian Contos

In continuation of our series of discussions on the new SEC Guidance, I was joined by Steven Fox, CISSP and QSA. He is a security architecture and engineering advisor at the U.S. Department of the Treasury. Mr. Fox brings a cross-disciplinary perspective to the practice of information security, combining his experience as a security consultant, Read more…

Tags:

Friday Security Highlights: 5 New Year’s Resolutions for the Enterprise

Friday, January 6, 2012 at 11:49am by Brian Contos
Brian Contos

The New Year is always a time for looking back on the past, and more importantly, looking forward and reflecting on the positive changes we want or need to make in the coming year. McAfee predicts that 2012 will continue to see cybercriminals improving their toolkits in many areas that pose a material threat to Read more…

Tags: , , ,

Security Journalist Leon Erlanger on New SEC Guidance

Thursday, January 5, 2012 at 9:42am by Brian Contos
Brian Contos

Earlier this week, I was able to sit down with one of our McAfee blog contributors, Leon Erlanger, for a podcast on SEC Security Guidance. Leon published a blog post earlier this month with his thoughts on the new guidance, and you can listen to his podcast interview at the end of this post. Leon, Read more…

Tags: