$1 million guarantee access to live fraud resolution agents Acquisition Alex Thurber Android Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity
Most of us refer to security policies in much the same way as we refer to our car manuals – when something unexpected happens. We know these documents have useful information. However, their utility is tied to situations where answers do not present themselves readily. According to Chris Noel, SVP of Product Management at ANXeBusiness, Read more…
Tags: enterprise scurity, Risk and Compliance, security policy
Visit any news site on the Web, and undoubtedly you’ll come across a barrage of articles publicizing the details of yet another data breach. With the prominence of SQL injection attacks, and malicious insiders and hackers exploiting sensitive data stored on unpatched and vulnerable databases, enterprise organizations have found themselves reevaluating their security strategies. Following Read more…
If we look at the evolution of hacking, certain techniques never go out of style, but we’re at the beginning of a big shift in terms of the targets. The threat landscape has evolved beyond PCs, tablets, and smartphones to a whole new battleground: connected devices all around us. According to Ericsson, there will be Read more…
Tags: black hat hackers, cyber attack, embedded, Hacking Exposed, Risk and Compliance, security, white hat hackers
While 99.9% network and server uptime has long been an established standard in data centers, the consumer experience so often fails to live up to that, and I as I was reminded of again this weekend. Unplanned network or server changes or vulnerabilities are often the cause of website outages. And, as the website Read more…
Tags: Cybercrime, data breach, data center, data center security, Data Protection, enterprise, Risk and Compliance
Recently I have been meeting with customers and resellers throughout Italy and Spain and it was interesting to hear that their needs from a security partner are very similar to those from the other countries I have recently visited. I have started to see strong interest in the McAfee DLP, Database Protection and Encryption technologies Read more…
Tags: Consumer, Cybercrime, EMEA, enterprise, Mid-Market, Network Security, Public Sector, Risk and Compliance
As an IT professional, often times you’re pulled in many different directions. With technology and the role of IT changing, you’re asked to cover various disconnected silos within an enterprise. When it comes to security, regardless of your business size or type – attacks happen. But how do you address security when you’re already stretched Read more…
Tags: enterprise, Mid-Market, Network Security, Risk and Compliance, Risk Management
With much fanfare and much to the chagrin of ne’er-do-wells far and wide, the Zeus Toolkit source code has been released to the public. This is notable because normally it would cost quite a bit to purchase the kit and associated services (in excess of of US$10,000). With a release of this sort, the most Read more…
Tags: counter identity theft, Cybercrime, global threat intelligence, malware, McAfee, McAfee Labs, Network Security, Risk and Compliance
Find out how McAfee partners can add recently-acquired Sentrigo solutions to their portfolio.
Tags: Acquisition, Channel Partners, database security, partners, risk, risk and, Risk and Compliance, security
If you’re responsible for database security and feel like scaring the living daylights out of yourself, check out www.privacyrights.org/data-breach. It’ll give you some idea of just how large of a problem security breaches truly are. Significant breaches are happening on almost a daily basis—and sometimes multiple major breaches are occurring in a single day. And Read more…
Tags: data breach, database security, enterprise, ePolicy Orchestrator, Risk and Compliance
I had the privilege of speaking before the House Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies at a hearing titled “Examining the Cyber Threat to Critical Infrastructure and the American Economy.” I was pleased to have the opportunity to provide McAfee’s perspective on the threats that face our nation’s infrastructure, as well as provide Read more…
Tags: critical infrastructure, Cybercrime, enterprise, Mid-Market, Night Dragon, Operation Aurora, Public Sector, Risk and Compliance
Posts tagged under Risk and Compliance