“Keep your friends close, and your enemies closer.” Attributed to Machiavelli and Sun Tzu, this truism points to the importance of keeping a close eye on those that can hurt you the most. Against a backdrop of unprecedented growth in smartphones and tablets in the enterprise, IT and security professionals – with an increasingly unfunded Read more…
Tags: Compliance, Mobile, mobile devices, mobile security
Last week, we hosted #SecChat on the topic of threats and cyber espionage. With the recent Night Dragon threat earlier this month, we thought it would inspire a timely and lively discussion. We were right. Looking back on the chat, we had over 50 contributors who were engaged and shared with us over 300 tweets Read more…
Tags: Compliance, cyberespionage, cyberthreats, security
The 9th Circuit U.S. Court of Appeals held recently, in Krottner v. Starbucks Corporation, that increased risk of future misuse of personal data following the theft of a laptop containing the unencrypted personal data of a group of current and former Starbucks employees amounted to an injury sufficient to confer standing to sue in federal court. Note Read more…
Tags: class action lawsuit, Compliance, Data Protection, DLP, encryption, enterprise, Mid-Market, Risk and Compliance
Blocking spam is the top job of your email security solution. When it is not working well, the user complaints come flying in. An effective anti-spam solution is critically important to have, but are spam catch rates the important criteria for selecting an email security solution? Not anymore. Virus Bulletin recently published its January anti-spam Read more…
Tags: Compliance, DLP, Email & Web Security, Risk and Compliance, spam
It seems that for many businesses, the first thing that suffers during the holiday crunch is anything that doesn’t bring in additional revenue – among them, maintaining PCI compliance. Look Back to Look Forward As you look back on the holidays, here are some questions to ask yourself: – How many people did it take Read more…
Tags: Compliance, enterprise, ePolicy Orchestrator, PCI, Risk and Compliance
When we sit down with our enterprise customers the discussion usually hinges on two questions: where is your enterprise security program today, and where do you want it to be tomorrow? For many companies, the answer is pretty straightforward – they want to improve their overall security posture, reduce risk, and lower costs. But how Read more…
Tags: Compliance, IT, Maturity Model, Optimized
The Stuxnet malware that recently surfaced is one key example of why McAfee is involved in protecting critical infrastructure such as the energy sector from attacks. Stuxnet is the first piece of malware that exploits a zero-day vulnerability in Windows to target control systems and utility companies. It is apparent that the Stuxnet creator used Read more…
Tags: Compliance, critical infrastructure, Cybercrime, McAfee Application Control, McAfee Vulnerability Manager, Public Sector
Last month I was invited to speak at our Executive Summit in Amsterdam, where 100 or so CIOs, CEOs and other executives from the Benelux area came to hear what McAfee was up to, and tell us where we were going right (and wrong). Not content with talking at them for the day, we plied Read more…
Tags: Compliance, Cybercrime, Data Protection, Risk and Compliance, security
Not content with naming-and-shaming companies who break the HIPAA/HITECH health regulations through the normal press, The U.S. Department of Health and Human Services is now reporting companies who lose control of more than 500 people’s records on their Web site. A duty to do this comes via section 13402(e)(4) of the HITECH act: “4) Posting Read more…
Tags: Compliance, Data Protection, HIPAA, law, legal, Risk and Compliance, security
McAfee Vulnerability Manager was distinguished among several competitive products with the coveted “Five-Star” and “Best Buy” rating in the February edition of SC Magazine. In the group test, SC Magazine put ten vulnerability assessment products through roughly 50 individual criteria that were developed by SC Magazine Labs and the Center for Regional and National Security Read more…
Tags: Compliance, McAfee Vulnerability Manager, Risk and Compliance, security
Posts tagged under Compliance