Feeds & Podcasts

Blogs

Archive

Tags

$1 million guarantee access to live fraud resolution agents Acquisition Alex Thurber Android Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

Risk and Compliance

Posts tagged under Risk and Compliance

Cultural Security: Promoting Security Policies Using Organizational Culture

Tuesday, September 6, 2011 at 11:13am by Steven Fox
Steven Fox

Most of us refer to security policies in much the same way as we refer to our car manuals – when something unexpected happens.  We know these documents have useful information.  However, their utility is tied to situations where answers do not present themselves readily. According to Chris Noel, SVP of Product Management at ANXeBusiness, Read more…

Tags: , ,

Building an Arsenal of Best-in-Breed Database Security Solutions

Friday, August 19, 2011 at 11:36am by Eric Schou
Eric Schou

Visit any news site on the Web, and undoubtedly you’ll come across a barrage of articles publicizing the details of yet another data breach. With the prominence of SQL injection attacks, and malicious insiders and hackers exploiting sensitive data stored on unpatched and vulnerable databases, enterprise organizations have found themselves reevaluating their security strategies. Following Read more…

Tags: , ,

Hackers vs. Hackers: The New Frontier Of Embedded Devices

Monday, June 27, 2011 at 12:53pm by Stuart McClure
Stuart McClure

If we look at the evolution of hacking, certain techniques never go out of style, but we’re at the beginning of a big shift in terms of the targets.  The threat landscape has evolved beyond PCs, tablets, and smartphones to a whole new battleground: connected devices all around us. According to Ericsson, there will be Read more…

Tags: , , , , , ,

The Consumer Experience, The Data Center And 99.9% Uptime

Monday, May 23, 2011 at 8:57pm by Evelyn de Souza
Evelyn de Souza

While 99.9% network and server uptime has long been an established standard in data centers, the consumer experience so often fails to live up to that, and I as I was reminded of again this weekend.    Unplanned network or server changes or vulnerabilities are often the cause of website outages.  And, as the website Read more…

Tags: , , , , , ,

My Recent Travels to Italy and Spain

Thursday, May 19, 2011 at 4:08pm by Gert Jan Schenk
Gert Jan Schenk

Recently I have been meeting with customers and resellers throughout Italy and Spain and it was interesting to hear that their needs from a security partner are very similar to those from the other countries I have recently visited.  I have started to see strong interest in the McAfee DLP, Database Protection and Encryption technologies Read more…

Tags: , , , , , , ,

How To Keep Security A Priority? Join #SecChat Thursday

Wednesday, May 18, 2011 at 11:56am by Brian Contos
Brian Contos

As an IT professional, often times you’re pulled in many different directions. With technology and the role of IT changing, you’re asked to cover various disconnected silos within an enterprise. When it comes to security, regardless of your business size or type – attacks happen. But how do you address security when you’re already stretched Read more…

Tags: , , , ,

Blue-Light Special on Zeus

Wednesday, May 11, 2011 at 12:54pm by Jim Walter
Jim Walter

With much fanfare and much to the chagrin of ne’er-do-wells far and wide, the Zeus Toolkit source code has been released to the public. This is notable because normally it would cost quite a bit to purchase the kit and associated services (in excess of of US$10,000). With a release of this sort, the most Read more…

Tags: , , , , , , ,

Database Security: A Profitable and Differentiated Offering

Wednesday, March 30, 2011 at 4:44pm by Alex Thurber
Alex Thurber

Find out how McAfee partners can add recently-acquired Sentrigo solutions to their portfolio.

Tags: , , , , , , ,

Is Database Security an Oxymoron?

Wednesday, March 23, 2011 at 6:10am by Eric Schou
Eric Schou

If you’re responsible for database security and feel like scaring the living daylights out of yourself, check out www.privacyrights.org/data-breach. It’ll give you some idea of just how large of a problem security breaches truly are. Significant breaches are happening on almost a daily basis—and sometimes multiple major breaches are occurring in a single day. And Read more…

Tags: , , , ,

Industry-Government Collaboration: Our Best Defense

Wednesday, March 16, 2011 at 6:21pm by Dr. Phyllis Schneck
Dr. Phyllis Schneck

I had the privilege of speaking before the House Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies at a hearing titled “Examining the Cyber Threat to Critical Infrastructure and the American Economy.” I was pleased to have the opportunity to provide McAfee’s perspective on the threats that face our nation’s infrastructure, as well as provide Read more…

Tags: , , , , , , ,