Monday, May 22, 2017

Unifying Data Protection Across Endpoint,...

Join McAfee's @DaveBullsEye on 6/7 in a webinar about unifying data protection across endpoint, network, and #cloud

Unifying Data Protection Across Endpoint,...

Learn more about McAfee’s newest Pervasive Data Protection solution along with CASB. Join Dave Bull, Director of Data Protection Solutions, to learn how McAfee Pervasive Data Protection will allow you to discover and protect your on premise and cloud resident data from compromise via a centralized control plane.
Intel Business Social Hub

An Analysis of the WannaCry Ransomware Outbreak

Learn more behind the WannaCry ransomware attack.

An Analysis of the WannaCry Ransomware Outbreak

Over the course of Friday, May 12 we received multiple reports of organizations across multiple verticals being victim to a ransomware attack. By Friday afternoon, McAfee’s Global Threat Intelligence system was updated to identify all known WannaCry samples and the company had delivered DAT signature updates to all its customers. But the wave of attacks ranks as one of the more notable cyber events in history.
Intel Business Social Hub

McAfee Raises the Stakes Against Cyberespionage

McAfee releases new research on the evolution of the #Shamoon cyberespionage campaigns.

McAfee Raises the Stakes Against Cyberespionage

On November 17, 2016, Shamoon malware struck once more. On the heels of the “new” McAfee launch, we are taking an important step in this effort by increasing investments and resources to fight and win with cyber threat research.
Intel Business Social Hub

Friday, May 12, 2017

World Password Day 2017

Worried about identity theft? It’s easy to #LayerUp and better secure your accounts. #IamIntel

World Password Day 2017

We are challenging every person and business to pledge to #LayerUp their logins, and to spread the word on how important this topic is.
Intel Business Social Hub

MasterCard Trials Biometric Bank Card With...

Bank cards requiring fingerprint scans are the next wave of financial security measures.

MasterCard Trials Biometric Bank Card With...

MasterCard's in-field testing of bank cards with fingerprint sensors was successful, paving the way for the future generation of financial security.
Intel Business Social Hub

Cybersecurity in the World of Artificial...

It's imperative to understand and control the dark side of AI. #IamIntel

Cybersecurity in the World of Artificial...

Being aware of the power of AI, there is a side of malice that is lurking beside the good it brings.
Intel Business Social Hub

Thursday, March 30, 2017

Spora Ransomware Infects 'Offline'-Without...

Learn how to spot Spora - ransomware that encrypts victims’ files and can work even offline.

Spora Ransomware Infects 'Offline'-Without...

Spora is a ransomware family that encrypts victims’ files and demands money to decrypt the files. It has infected many computers in a short time due to a huge spam campaign. It has a very special feature—to work offline.
Intel Business Social Hub

Schools Become Tempting Targets in Cyberwar

A #security audit can be a useful tool for schools looking to protect their data.

Schools Become Tempting Targets in Cyberwar

Many schools might not have the money for a dedicated cybersecurity employee, but an audit and some best practices can go a long way.
Intel Business Social Hub

Security-Intelligence Systems and the Future of...

Understanding avenues of cyberattack with #security intelligence is vital.

Security-Intelligence Systems and the Future of...

Understanding and implementing security intelligence, a methodology that encourages organizations to chart all the possible methods of attack, is an extremely useful practice.
Intel Business Social Hub

Friday, March 24, 2017

Analyzing a Fresh Variant of the Dorkbot Botnet

A new variant of the #Dorkbot botnet has emerged. Here's @McAfee's analysis of it. #IamIntel

Analyzing a Fresh Variant of the Dorkbot Botnet

At McAfee Labs, we have recently observed a new variant of the Dorkbot botnet. Dorkbot is a well-known bot, famous for its various capabilities including backdoor, password stealing, and other malicious behavior.
Intel Business Social Hub

We Must Automate Cyber Threat Defense to Survive

"We must automate cyber threat defense to survive," says @Ken_Kartsen. #IamIntel

We Must Automate Cyber Threat Defense to Survive

In a time of ever-increasing IT complexity, government agencies are continually being asked to do more with less.
Intel Business Social Hub

Thursday, March 23, 2017

Lead Information Security Engineer Interview...

Here from a lead information engineer about migrating to McAfee Endpoint Security. #IamIntel

Lead Information Security Engineer Interview...

Chris T. is the lead information security engineer on a team that oversees a host of McAfee endpoint and network products at his U.S. insurance company with approximately 8,000 endpoints. The company recently migrated endpoints to ENS 10.2 and plans to migrate to ENS 10.5 in the next three months.
Intel Business Social Hub

Tilting the Playing Field: How Misaligned...

Learn from this survey of 800 #cybersecurity professionals about how companies can be more competitive. #IamIntel

Tilting the Playing Field: How Misaligned...

In a new report commissioned by Intel Security, "Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity," the Center for Strategic and International Studies surveyed 800 cybersecurity professionals to reveal how a mismatch of incentives gives cybercriminals an advantage.
Intel Business Social Hub

Wednesday, March 22, 2017

New Assessment Warns Industry that Cyber...

UK agency warns that cyber criminals are imitating the way suspected nation state actors attack.

New Assessment Warns Industry that Cyber...

The annual assessment of the biggest cyber threats to UK businesses emphasises the need for increased collaboration between industry, government and law enforcement in the face of a growing and fast-changing threat.
Intel Business Social Hub

5 Cybersecurity Predictions for FSI

A secure #IoT will be a challenge moving forward for FSI, along with other roadblocks.

5 Cybersecurity Predictions for FSI

FSI is facing big security vulnerabilities and challenges. Securing the IoT and protecting against smarter attacks will be a priority.
Intel Business Social Hub

Busting the Malware Silver Bullet Myth

There's no “silver bullet” for every #security threat. Join this @McAfee Tech Talk to learn more. #IamIntel

Busting the Malware Silver Bullet Myth

Join Josh Thurston from the McAfee Office of the CTO, on this Tech Talk to learn how McAfee Endpoint Security combats targeted attacks.
Intel Business Social Hub

Tuesday, March 21, 2017

Data Sovereignty and Moving to The Cloud

You can break #data sovereignty difficulties into 3 blocks that make it manageable.

Data Sovereignty and Moving to The Cloud

Data sovereignty doesn’t have to be impossible to understand. Break it down into where your data needs to reside, the fine print, and the transparency of your cloud services.
Intel Business Social Hub

Monday, March 20, 2017

The Hidden Problem with Easy Cybercrime

Using ransomware is easy, which is part of what makes it such a #security problem. #IamIntel

The Hidden Problem with Easy Cybercrime

Ransomware creates enormous problems for cybersecurity, not only because of its dangers, but because it is very easy for anyone to start using it to steal.
Intel Business Social Hub

10 Ways to Reduce Insider BYOD Threats

BYOD can be a real #security risk, and knowing when to say no to it is important.

10 Ways to Reduce Insider BYOD Threats

BYOD presents an emergent security threat for every business that allows it. Good policies and a culture of responsibility can make a big difference.
Intel Business Social Hub

Phishing for W-2s: Keeping Your Financial Data...

How to keep your financial data safe during #taxseason. #IamIntel

Phishing for W-2s: Keeping Your Financial Data...

Ready or not, here comes tax season. And as you’re getting your ducks in a row, prepping your W-2 forms, and speaking with your tax advisor, cybercriminals are devising a monetary strategy of their own—one focusing on your money, that is.
Intel Business Social Hub

Malware: 5 Tips for Fighting the Malicious...

5 tips for fighting #malware from @McAfee. #IamIntel

Malware: 5 Tips for Fighting the Malicious...

From an entire attack campaign on banks worldwide, to a strain residing within medical devices, to a variant that has learned to self-heal, the list of malware-based attacks goes on.
Intel Business Social Hub

Intel, Microsoft Launch New Bug Bounty Programs

.@Intel and @Microsoft launch new bug bounty programs, offering thousands in rewards.

Intel, Microsoft Launch New Bug Bounty Programs

Intel has finally joined the bug bounty game with financial rewards on offer up to $30,000.
Intel Business Social Hub

Friday, March 10, 2017

Helping Overburdened SOC Analysts Become More...

Here's how #security operations center analysts can become more effective threat hunters. #IamIntel

Helping Overburdened SOC Analysts Become More...

Security operations center analysts confront a tough paradox almost daily. In a perfect world, every SOC would have the resources to 1) proactively hunt or search for the presence of adversaries in the network, and 2) for analysts tasked with incident response activities, to profile the types of threats that they encounter on a daily basis, trying to determine attack and compromise vectors that will assist with the containment and eradication strategy.
Intel Business Social Hub

Are big banks now finally now on the same...

The hybrid #cloud approach is proving to be a secure and solid option for banks.

Are big banks now finally now on the same...

Banks are embracing the cloud, and while there’s some debate about the merits of public vs. private, many are opting for a hybrid approach.
Intel Business Social Hub

When Vending Machines Attack

As one university’s struggle with a botnet shows, our #IoT devices need better #security.

When Vending Machines Attack

Due to insufficient security, many automated devices are causing problems. One university’s vending machines rebelled after a botnet attack.
Intel Business Social Hub

Six Ways to Defend Against Digital Threats

A robust #cybersecurity plan requires a mindset that incorporates many disparate concepts.

Six Ways to Defend Against Digital Threats

A holistic approach to cybersecurity, as well as robust security on the edge are requirements to keeping your organization safe.
Intel Business Social Hub

Thursday, March 9, 2017

The Answer to Big Cybersecurity Challenges:...

"Cybersecurity needs a Dream Team, like the 1992 Olympics," says @youngdchris. #IamIntel

The Answer to Big Cybersecurity Challenges:...

While cybersecurity and potential threats against the digital experience have never been bigger, current defensive measures aren’t working. Tomorrow demands a different response from all of us, starting today.
Intel Business Social Hub

Macro Malware Targets Macs

Malicious code hidden in user forms and macros in Microsoft Office files now goes after Macs, too. #IamIntel

Macro Malware Targets Macs

Macro malware has been spreading for years. New techniques arise all the time to hide malicious code and thus increase the difficulty of analysis. However, just targeting Microsoft Windows no longer seems to be enough for the malware authors. The Mac appears to be the new challenge, and attackers appear to be rising to this challenge.
Intel Business Social Hub

Continuous Monitoring Can Help You Stop the Bad...

Companies need to move from passive prevention and detection #cybersecurity to proactive defense. #IamIntel

Continuous Monitoring Can Help You Stop the Bad...

Most security organizations have historically been focused on the prevention portion of the prevent-detect-correct threat defense lifecycle. The proliferation of some high-profile security breaches in the past few years, however, has demonstrated the weakness in that strategy.
Intel Business Social Hub

Researchers Simulate a Ransomware Attack on...

Ransomware could potentially target water supplies, #cybersecurity researchers say.

Researchers Simulate a Ransomware Attack on...

Ransomware is a major threat, and researchers from the Georgia Institute of Technology are proving it with a fake attack on a water supply.
Intel Business Social Hub

Tuesday, March 7, 2017

Wonder what the biggest concerns for #cloud...

Read the newest cloud report based on responses from 1,400 IT security pros from around the globe. #IamIntel

Wonder what the biggest concerns for #cloud...

Wonder what the biggest concerns for #cloud security professionals are? The answers, here: https://t.co/uojI6agTAJ
Intel Business Social Hub

CIO Blown Away with Migration to McAfee...

CIOs should partner with @McAfee because it is not only a leader but an innovator in technology. #IamIntel

CIO Blown Away with Migration to McAfee...

Advantage Waypoint recently deployed McAfee Endpoint Security 10.2 across the company’s approximately 1,500 endpoints, including three geographically dispersed data centers.
Intel Business Social Hub

Monday, March 6, 2017

Landmark Cybersecurity Proposals from White...

Intel looks to work with cybersecurity proposals from White House on workforce development & privacy. #IamIntel

Landmark Cybersecurity Proposals from White...

It’s great to see the White House leaning forward and taking action to improve our national Cyber Security posture by announcing a Cybersecurity National Action Plan (CNAP) and issuing an Executive Order to create a permanent Federal Privacy Council. Both initiatives will improve the national posture on cybersecurity and privacy – issues Intel believes are closely related.
Intel Business Social Hub

Unpacking Ransomware and the Ransomware Threat...

Hear from @Intel experts about the current #ransomware landscape. #IamIntel

Unpacking Ransomware and the Ransomware Threat...

Hear unique insights about the ever tending topic of ransomware with lessons to help further protect your organization.
Intel Business Social Hub

McAfee Labs 2017 Threats Predictions

Don't miss @McAfee_Labs 2017 Threats Predictions. #IamIntel

McAfee Labs 2017 Threats Predictions

McAfee Labs researchers offer long-lens predictions about cloud and internet of things (IoT) threats, laws, and vendor responses.
Intel Business Social Hub

Stop Attacks Before They Act with Dynamic...

See what the future of machine learning can do to improve threat protection in this @IntelSecurity video. #IamIntel

Stop Attacks Before They Act with Dynamic...

Learn about the Dynamic Endpoint along with Adaptive Threat Protection and the outcomes that benefit you.
Intel Business Social Hub

Protecting the Connected Home of the Future...

Any #smarthome must be safe, which is why McAfee Secure Home Platform blocks attacks at the router level. #IamIntel

Protecting the Connected Home of the Future...

McAfee Secure Home Platform automatically protects internet-connected devices on your home network from a variety of threats. Attacks are blocked at the router level, delivering robust security features that can be controlled from an easy-to-use mobile app.
Intel Business Social Hub

Wednesday, February 15, 2017

Key Criteria to Secure Mobile Enterprise

Learn the 4 keys to success for improving #mobile data #security in the workplace.

Key Criteria to Secure Mobile Enterprise

In a mobility-driven world, what are the best ways to improve mobile data security? Here are your steps to success.
Intel Business Social Hub

Smart City: The Next Step or Privacy Threat?

See why #smartcity growth is still a big fear for many people around the world.

Smart City: The Next Step or Privacy Threat?

Of 2000 people surveyed, 67 percent said smart city tech was not a good investment for public funds. What’s the key to changing their minds?
Intel Business Social Hub

Tuesday, February 14, 2017

Cybersecurity is an Existential Threat. Here is...

What’s the biggest #cybersecurity concern today? Believe it or not, it’s scalability.

Cybersecurity is an Existential Threat. Here is...

Scalability is becoming a major problem for cybersecurity, especially with the flood of smartphones and IoT-enabled devices hitting the market.
Intel Business Social Hub

Monday, February 13, 2017

Education, Technology Key to Keeping Government...

What’s the biggest threat to employees using #mobile devices? Malicious #apps, to start.

Education, Technology Key to Keeping Government...

Learn why apps are the most dangerous threat to government workers in the mobile landscape, and why this may always be the case.
Intel Business Social Hub

Digital Twins and AI Help Extract Maximum Value...

See why @generalelectric is moving beyond #AI and the #IoT to focus on Digital Twins.

Digital Twins and AI Help Extract Maximum Value...

Ever heard of a Digital Twin? It’s a replica of a physical system that predicts problems and optimizes operations. And it’s big in India.
Intel Business Social Hub

Cybersecurity is an Existential Threat. Here is...

What’s the biggest #cybersecurity concern today? Believe it or not, it’s scalability.

Cybersecurity is an Existential Threat. Here is...

Scalability is becoming a major problem for cybersecurity, especially with the flood of smartphones and IoT-enabled devices hitting the market.
Intel Business Social Hub

Executive Summary: Why Your Computer’s Age Matters

Old hardware could be costing your company more than you think. #IamIntel

Executive Summary: Why Your Computer’s Age Matters

Companies often tolerate old hardware and legacy systems for financial reasons. But cutting costs is also an effective argument for an upgrade. Dig deep into the ROI of fresh tech with this whitepaper.
Intel Business Social Hub

Education, Technology Key to Keeping Government...

What’s the biggest threat to employees using #mobile devices? Malicious #apps, to start.

Education, Technology Key to Keeping Government...

Learn why apps are the most dangerous threat to government workers in the mobile landscape, and why this may always be the case.
Intel Business Social Hub

Friday, February 10, 2017

Bring Your Own Device: Weighing the Business...

BYOD to work? See why it’s more like BYOCC (Bring Your Own #CyberCrime).

Bring Your Own Device: Weighing the Business...

When you bring your own laptop or smartphone to work, you’re also bringing your own viruses and security problems.
Intel Business Social Hub

Who's at Fault? New Technology Captures Traffic...

See how new #IoT devices in trucks can prove who caused an accident.

Who's at Fault? New Technology Captures Traffic...

SmartDrive cameras in cars and trucks are helping put the blame of bad driving where it belongs: on bad drivers.
Intel Business Social Hub

Trojanized Photo App on Google Play Signs Up...

Careful what you install, these popular Android photo apps are actually trojans. #IamIntel

Trojanized Photo App on Google Play Signs Up...

Mobile apps usually have names that give some indication of their function. In one recent case, however, McAfee found a misnamed app that turned out to be malicious.
Intel Business Social Hub

McAfee Enterprise Security Manager Deployment...

The Intel Security Solution Services team provides peace of mind using industry best practices. #IamIntel

McAfee Enterprise Security Manager Deployment...

We live and work in an ever-evolving, data-driven environment that’s making it vital for businesses to integrate intelligent and scalable security information and event management (SIEM) solutions. The Intel Security Solution Services team can provide you peace of mind.
Intel Business Social Hub

2017 - New Year, Better Security

What are your #security goals in 2017? #IamIntel

2017 - New Year, Better Security

Every year around this time you can find gazillions (technical term) of articles about New Year’s resolutions and planning, for your job or personal life. What about resolutions for your security? How are you planning to avoid malware, practice incident response, and save money?
Intel Business Social Hub