Feeds & Podcasts

Enterprise Blogs

Meet the Bloggers

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

CSO / Risk Management

All organizations are at risk of cybercrime, but they don’t all become victims. Find out why as McAfee experts guide you through the process of assessing your company’s specific vulnerabilities and protecting networks, users, data, and endpoints.

Posts in CSO / Risk Management

Predictive Security

Tuesday, April 21, 2009 at 10:27am by Mike Gallagher
Mike Gallagher

Update: Watch McAfee CEO Dave DeWalt’s RSA Conference keynote on Predictive Security and also view my video on the topic. The year started off really well for malware authors, with the Conficker worm infecting millions of computers. Threats are not only increasing on a daily basis but they are also getting smarter in leveraging multiple Read more…

Tags: ,

Millions Spent On Microsoft Flaw, But Not By McAfee Customers

Tuesday, November 4, 2008 at 8:01pm by Editor
Editor

As most of you now know, on 10/23, Microsoft announced a critical out-of-cycle patch (MS08-067) to fix a flaw being exploited by cybercrooks. The vulnerability affects all major versions of Microsoft Windows.  In just a matter of moments, attackers can gain total remote control of a system and install malware, keyloggers, and Trojans. A successful Read more…

Tags: , , ,

Latest attacks underline growing threat to governments

Friday, June 13, 2008 at 2:41pm by Jeff Green
Jeff Green

Two members of the House of Representatives on Wednesday said their computer systems were broken into, the latest in a series of cybersecurity alarms raised by the government. The lawmakers suggest that the break-ins were carried out by people who appear to be working from inside China seeking confidential lists of names of dissidents. Virginia Rep. Read more…

Listen to your gut when weighing risk

Thursday, May 1, 2008 at 7:10pm by Charles Ross
Charles Ross

Our brain is an amazing marvel that provides us the wisdom necessary to navigate the river of life.  Until recently though, research around how humans handle risks they encounter was spotty at best.  Understanding, and being able to influence, how we react to risks is key to making better decisions in life. A recent study Read more…

Early Threat Detection using Human Social Habits

Thursday, February 28, 2008 at 1:36pm by Charles Ross
Charles Ross

Leave it to the Air Force Institute of Technology to develop technology that detects patterns in email/web usage that could offer leading indicators of insider security threats.    The technology is called Probabilistic Latent Semantic Indexing (try saying that a couple times fast). It sifts through email and web traffic logs to identify trends in Read more…

Virtualization equals real security

Wednesday, February 27, 2008 at 9:09pm by Editor
Editor

Hotels in Cannes don’t just sell out for the Film Festival; all rooms are also booked for a big IT show this week: VMware’s first VMworld Europe. Today I showed an audience of about 4,500 people at VMworld Europe how VMware and McAfee together will be able to protect virtual environments in ways beyond what Read more…

Should Mac users worry about security?

Monday, January 28, 2008 at 5:55pm by Editor
Editor

I attended the Macworld 2008 Conference last week in San Francisco, and in retrospect several diametrically-opposing observations come to mind on the experience. First, and foremost as a security professional, I was struck by how little concern there is in the Mac community for matters of information security and personal information protection. Everyone reading this Read more…

Are companies doing enough to avoid becoming the first true poster child for data loss?

Monday, January 28, 2008 at 2:05pm by Charles Ross
Charles Ross

Data loss is a burning issue that should be on the mind of every C-level executive and board member, if it isn’t already. According to a recent Ponemon Data Loss Study, the costs associated with data breaches rose 55% in 2007. What is troubling is the scope and opportunity for such abuse and loss of Read more…

Why Reinvent the Wheel?

Friday, January 18, 2008 at 6:01pm by Editor
Editor

Open source software provides an invaluable benefit to almost any software developer, including McAfee. In the future I expect the use of open source code by software makers to increase. Why is open source code so important? Well, because a software developer can use open source code instead of spending time developing code that does Read more…

A Malware Epidemic in 2007

Tuesday, January 8, 2008 at 3:14pm by Editor
Editor

If you read Jeff Green’s post on the Avert Labs blog yesterday, you saw that there was a staggering increase in the amount of malware last year, reaching almost “epidemic” proportions. By year’s end, there were 357,820 pieces of malware, up from 221,935 at the beginning of the year. That’s one driver written every four Read more…