Feeds & Podcasts

Blogs

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

enterprise

Posts tagged under enterprise

Virtualization Might Break Compliance

Monday, October 31, 2011 at 11:16am by Stephen Karkula
Stephen Karkula

I recently read a Gabriel Consulting Group survey entitled 2011 Data Center Security Survey: Virtualization & Clouds. One statistic that really struck me was that approximately 65 percent of the respondents said that they were going to use “the same security mechanisms for physical and virtual systems.” This is an amazing statistic since most security Read more…

Tags: , , , ,

Urchins, LizaMoons, Tigers, and Bears

Friday, October 21, 2011 at 11:44am by Jim Walter
Jim Walter

In early April, I wrote about the famed “LizaMoon” SQL-injection attacks. I said it then, and I’ll say it again now: SQL-injection (SQLi) attacks are a constant. Some of these attacks are more visible than others.  Some adversaries find intelligent ways to hide their tracks so as not to splatter evidence of their misdeeds all over various search Read more…

Tags: , , , , , , , , , ,

I Can See the Evolution and It’s Exciting

Monday, October 17, 2011 at 11:48am by Marc Olesen
Marc Olesen

Evolution is usually something we see after hundreds of years of gradual change.  But with the volume and breadth of technological advancements in the last decade, the process of evolution continues to speed up.  As a senior vice president and general manager of McAfee Content & Cloud Security, I am really fortunate to be in Read more…

Tags: , ,

Key Findings Of 2011 Datacenter Security Survey Reveal That Security Is Grossly Underserved

Monday, October 3, 2011 at 5:00am by Dan Olds
Dan Olds

Gabriel Consulting Group (GCG), an independent analyst firm, today released key findings of its 2011 Data Center Security Survey, a report focused on security issues and solutions among 147 enterprise data center managers responsible for data centers of all sizes. The results were startling, as is often the case with surveys, and so we thought Read more…

Tags: , , , ,

Friends, Foes and Faceless Denizens – The Real Social Network

Monday, September 12, 2011 at 10:03am by Steven Fox
Steven Fox

I recently performed a penetration test of a transportation company in the Midwest. Save for a few low-severity vulnerabilities, Company X had a well-managed public-facing network infrastructure.  Satisfied with the status of their network security, I turned my attention to the human network. Searching for Company X on sites like Twitter, Facebook, and LinkedIn, I Read more…

Tags: , , ,

McAfee Security Certification Program

Tuesday, September 6, 2011 at 8:32am by Robert Welty
Robert Welty

McAfee Security Certification Program Today, McAfee is excited to announce the addition of two new exams and certifications to our McAfee Security Certification Program. We launched the program back in January with two initial assessments, promising to add to our curriculum as time went on. The two new certifications, McAfee Certified Product Specialist – Network Read more…

Tags: , ,

Friday Security Highlights: Security Breach Showcase

Friday, August 26, 2011 at 1:32pm by Brian Contos
Brian Contos

Welcome to another week in infosec with Friday Security Highlights. Yesterday from the @McAfeeBusiness Twitter handle, we live-tweeted the Dark Reading & InformationWeek virtual session The Aftermath of a Security Breach – Getting the Ship Righted Again. We tuned in as speakers and infosec thought leaders Jerry Johnson (@jerryjpnnl), Ernest McDuffie, and Rich Mogull (@rmogull) Read more…

Tags: , , , ,

Building an Arsenal of Best-in-Breed Database Security Solutions

Friday, August 19, 2011 at 11:36am by Eric Schou
Eric Schou

Visit any news site on the Web, and undoubtedly you’ll come across a barrage of articles publicizing the details of yet another data breach. With the prominence of SQL injection attacks, and malicious insiders and hackers exploiting sensitive data stored on unpatched and vulnerable databases, enterprise organizations have found themselves reevaluating their security strategies. Following Read more…

Tags: , ,

Can Data Center Consolidation Result in Improved Security Posture?

Tuesday, July 26, 2011 at 1:55pm by Evelyn de Souza
Evelyn de Souza

 The federal government plans to shut 40 percent of its computer centers over the next four years to reduce its hefty technology budget and modernize the way it uses computers to manage data and provide services to citizens. It is a part of  the strategy outlined in a memo from March last year to Federal agencies, which Read more…

Tags: , , , , ,

July #SecChat: Security Conferences – To Attend or Not to Attend

Friday, July 22, 2011 at 8:49am by Brian Contos
Brian Contos

Cyber Security Conferences have been around almost as long as Cyber Security itself, but are they worth attending? During this month’s #SecChat, Thursday, July 28 at 11am PT, we want you to sound off and make yourself heard regarding our industry’s mass of mainstream and “hacker” security events. We want to know what you, as Read more…

Tags: , , , , , , , ,