Quantcast
Channel: Blog Central » CTO
Browsing latest articles
Browse All 28 View Live

What Operation Troy Teaches Us about Attribution & Intent

Today, McAfee Labs officially released the “Dissecting Operation Troy: Cyberespionage in South Korea” whitepaper, an in-depth study by our APT research team into a previously undetected lineage of...

View Article



Operation Troy: OpenIOC Release

  In conjunction with our investigation into Operation Troy, we will be releasing IOC data in the open and highly flexible OpenIOC Framework format. The McAfee Operation Troy IOC can be downloaded...

View Article

Next Generation Firewalls Are Mission-Critical

The demands placed on enterprise networks are greater than at any time in the past. Data analysis has transformed into big data analysis. Banks process millions of transactions per second. Cloud...

View Article

The Security of Cars: Why the “Killer Demo” Isn’t Enough

Gone are the days when we only needed to worry about protecting our personal computers, or even our mobile devices.  Every day devices that we take for granted are now being enhanced with powerful new...

View Article

What is a Next-Generation Firewall?

In my last post, I outlined the business case for converting to a next-generation firewall. Essentially, it’s about protecting valuable IT assets in the face of advanced malware with sophisticated...

View Article


Saying Goodbye to Dr. Schneck: With a Heavy Heart, but with Great Anticipation

This is a bittersweet moment for me. McAfee is losing a tremendous talent as Dr. Phyllis Schneck heads to the Department of Homeland Security to take on a critical leadership role in cyber security...

View Article

Seven Myths of Advanced Malware – Myth #1: The Challenge is that I Cannot...

Advanced malware is the latest and potentially most destructive threat in cyberspace. These advanced threats are stealthy, targeted and very patient. Though often based on well-known malware with...

View Article

Seven Myths of Advanced Malware — Myth #2: Sandboxing Blocks Malware

In my first post on the Seven Myths of Advanced Malware, I addressed the myth that “the challenge is, I can’t find advanced malware.”  We decided that the myth is false, because you can find advanced...

View Article


Invisible Protection — The Evolution of Mobile Containers

When it comes to protecting corporate data on end user computing devices, there has always been a need to strike the right balance between security and productivity. In a PC-dominated world, this...

View Article


Product Coverage and Mitigation for CVE-2013-3893

Microsoft Security Advisory (2887505) On September 17th, 2013, Microsoft published Security Advisory 2887505, which coverers a remote code execution vulnerability in all supported versions of Microsoft...

View Article
Browsing latest articles
Browse All 28 View Live




Latest Images