#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity
Focused on the issues facing today’s security managers, this blog contains tips and techniques from McAfee experts that can help improve team dynamics, development, and workflow. This forum is also a great resource for upcoming management conferences and training opportunities.
Today, McAfee completed its acquisition of privately held NitroSecurity, an enterprise-class security and information management (SIEM) security vendor. I’ll be talking more about this acquisition with Ken Levine, chairman, president and chief executive officer, NitroSecurity, during a McAfee Webcast December 7 at 9:00 am Pacific Time. To register, please visit http://events.mcafee.com/forms/11Q4McAfeeAcquiresNitrowebcast. NitroSecurity is a leader Read more…
Tags: NitroSecurity, security management, SIEM
I am excited to share that McAfee has officially announced its intent to acquire privately owned NitroSecurity. NitroSecurity is a leading provider of security information and event management (SIEM) solutions that offers complete visibility and situational awareness to protect critical information and infrastructure. With NitroSecurity’s technology and talent, McAfee can expand its reach into the fast Read more…
Welcome to “15 minutes with” – an occasional contribution between myself and the movers-and-shakers within McAfee’s technical community. This week on the stand is my good friend and occasional co-presenter, David O’Berry CSSLP, CISSP-ISSAP, ISSMP, CRMP. Now a McAfee Strategic systems engineer, his previous life was 19 years in the public sector, culminating as Director Read more…
On October 6-9, 2009, security professionals from around the world will come together for four days of networking and learning at FOCUS 09, McAfee’s 2nd annual security conference. As you may know, we have an assortment of valuable sessions and events planned: Keynotes from prominent leaders and industry visionaries, including: Gen. Colin Powell, USA (Ret.); Read more…
Anton Chuvakin makes it clear why security isn’t a silo and can’t be considered separate from other aspects of IT or business. He points to a quote from a paper suggesting that networking and security should be separate, with a networking group configuring network devices and a security group configuring security devices — and then Read more…
Encryption is an important tool in any IT security strategy. It may not be perfect for everything, but it’s useful in many, many cases. However, there’s a company in Canada that claims encryption isn’t good because attackers can still see that there’s data there, even if they can’t read it. They seem to downplay the Read more…
Posts in Management