
Connecting the dots to North Korea as a threat adversary
Reports of malware campaigns invariably focus on two critical conclusions: attribution and who was the intended target of the attack. It is challenging to draw swift …
ThreatConnect’s Playbooks partner-focused orchestration applications
ThreatConnect announces its series of partner-centered Playbooks applications to help orchestrate and automate security processes. These new applications focus on enriching …
McAfee and LG collaborate to enable children a safer online experience
McAfee announced an extension of its collaboration with LG to pre-load McAfee Safe Family on the LG G7 ThinQ, Q7, Q7+, and Q Stylus in 32 European countries. Additionally, all …
McAfee MVISION Portfolio as a SaaS-delivered workspace
McAfee announced McAfee MVISION, a portfolio featuring McAfee innovations designed to give customers a defense system that manages their security products based on their needs …
McAfee ePolicy Orchestrator now available on AWS
McAfee announced the availability of McAfee ePolicy Orchestrator (ePO) on AWS. This AWS deployment option provides organizations time to focus on security concerns by …

Innovation in healthcare: A hacker’s dream and CISO’s nightmare?
It’s hard not to be excited about artificial intelligence and machine learning in pure technology terms, but applying these innovations to the healthcare sector has the …

Cybercriminals will gravitate to criminal activity that maximizes their profit
McAfee released its McAfee Labs Threats Report: June 2018, examining the growth and trends of new malware, ransomware, and other threats in Q1 2018. McAfee Labs saw on average …

Most aerospace and defense companies to integrate blockchain by 2021
Approximately six in seven aerospace/defense companies (86 percent) expect to integrate blockchain into their corporate systems within three years, according to a new research …

Don’t start the blockchain revolution without making security a top priority
McAfee released a report detailing the numerous cybersecurity risks associated with blockchain-based cryptocurrencies, and asserts the necessity of making cybersecurity a top …

Social media: The zero-trust game
Our value today is measured in numbers. Followers, connections, likes, tweets, and impressions now count toward not only the value of our opinions but also quantify our sphere …

1-in-4 orgs using public cloud has had data stolen
McAfee has polled 1,400 IT professionals across a broad set of countries (and continents), industries, and organization sizes and has concluded that lack of adequate …

Information security can enable business as soon as we change the conversation
Information security is an enabler for business. This has been a mantra for some time, and although it is repeated at major conferences, the reality is that the lack of good …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility