#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity
I recently read a Gabriel Consulting Group survey entitled 2011 Data Center Security Survey: Virtualization & Clouds. One statistic that really struck me was that approximately 65 percent of the respondents said that they were going to use “the same security mechanisms for physical and virtual systems.” This is an amazing statistic since most security Read more…
Tags: Cloud computing, data center security, enterprise, VIrtual Machines, Virtualization
In early April, I wrote about the famed “LizaMoon” SQL-injection attacks. I said it then, and I’ll say it again now: SQL-injection (SQLi) attacks are a constant. Some of these attacks are more visible than others. Some adversaries find intelligent ways to hide their tracks so as not to splatter evidence of their misdeeds all over various search Read more…
Tags: Cybercrime, Data Protection, database security, enterprise, lizamoon, malware, mass sql injection, Network Security, sql attacks, SQL Injection, urchin.js
Evolution is usually something we see after hundreds of years of gradual change. But with the volume and breadth of technological advancements in the last decade, the process of evolution continues to speed up. As a senior vice president and general manager of McAfee Content & Cloud Security, I am really fortunate to be in Read more…
Tags: Cloud computing, cloud security, enterprise
Gabriel Consulting Group (GCG), an independent analyst firm, today released key findings of its 2011 Data Center Security Survey, a report focused on security issues and solutions among 147 enterprise data center managers responsible for data centers of all sizes. The results were startling, as is often the case with surveys, and so we thought Read more…
Tags: cloud, data center, data center security, enterprise, Virtualization
I recently performed a penetration test of a transportation company in the Midwest. Save for a few low-severity vulnerabilities, Company X had a well-managed public-facing network infrastructure. Satisfied with the status of their network security, I turned my attention to the human network. Searching for Company X on sites like Twitter, Facebook, and LinkedIn, I Read more…
Tags: enterprise, Information Security, privacy, social media
McAfee Security Certification Program Today, McAfee is excited to announce the addition of two new exams and certifications to our McAfee Security Certification Program. We launched the program back in January with two initial assessments, promising to add to our curriculum as time went on. The two new certifications, McAfee Certified Product Specialist – Network Read more…
Tags: certification, enterprise, security
Welcome to another week in infosec with Friday Security Highlights. Yesterday from the @McAfeeBusiness Twitter handle, we live-tweeted the Dark Reading & InformationWeek virtual session The Aftermath of a Security Breach – Getting the Ship Righted Again. We tuned in as speakers and infosec thought leaders Jerry Johnson (@jerryjpnnl), Ernest McDuffie, and Rich Mogull (@rmogull) Read more…
Tags: #SecChat, Cybercrime, data breach, enterprise, Network Security
Visit any news site on the Web, and undoubtedly you’ll come across a barrage of articles publicizing the details of yet another data breach. With the prominence of SQL injection attacks, and malicious insiders and hackers exploiting sensitive data stored on unpatched and vulnerable databases, enterprise organizations have found themselves reevaluating their security strategies. Following Read more…
The federal government plans to shut 40 percent of its computer centers over the next four years to reduce its hefty technology budget and modernize the way it uses computers to manage data and provide services to citizens. It is a part of the strategy outlined in a memo from March last year to Federal agencies, which Read more…
Tags: cloud, consolidation, data center, data center security, enterprise, security optimization
Cyber Security Conferences have been around almost as long as Cyber Security itself, but are they worth attending? During this month’s #SecChat, Thursday, July 28 at 11am PT, we want you to sound off and make yourself heard regarding our industry’s mass of mainstream and “hacker” security events. We want to know what you, as Read more…
Tags: #SecChat, Blackhat, DefCon, enterprise, Interop, OWASP, RSA, SecTor, security conferences
Posts tagged under enterprise