John E Dunn
September 28th, 2012
Young workers use software differently. This is how it should be.
Out on the front line of security admin, something appears to have gone badly wrong and yet until now barely a voice has been raised in complaint. As business desktops have shifted from Windows XP to Windows 7, it turns out that an unknown number of workers have been quietly running riot on networks using application privileges.
In most cases the symptom is a tiresome rise in User Account Control (UAC) requests that are a feature of Windows 7 security – ‘please let me run this application’ – leaving admins with the chore of working out whether the request is legitimate for the person making it, indeed whether the application should be run at all.
- May 31st, 2017
In April we welcomed the return of the McAfee brand, one of the trailblazers in the ongoing battle against cyber crime. In a well-articulated blog post, McAfee CEO, Chris Young, set out the vision and mission of the #NewMcAfee and laid down its ambitious plans to take the business forward and ultimately shape the security marketplace as never before.
- December 21st, 2016
Over the course of 2016, McAfee has been progressing a story and supporting a technical strategy that addresses the challenges of a rapidly changing risk landscape. In recent years at McAfee’s annual security conference, FOCUS, we’ve seen Chris Young, Brian Dye and others mature a narrative that started with more integrated products, and then an integration framework with the Data Exchange Layer (DXL) and now a DXL that’s going to be released as open source.
- October 4th, 2016
Leveraging technology partnerships to drive customer value
- September 16th, 2016
For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were a few bridges here and there but the various islands remained largely inaccessible. It became clear, however, that in this era of rapidly evolving and advanced threats, we needed to find a way to build those bridges, to join the dots and ensure each part of the ‘security archipelago’ is not only connected, but integrated, with open channels of communication.
- September 25th, 2013
User Account Control was a great idea but it has taken privilege management to fulfill its potential
How did computer security get into such a troubled and confused state? It’s a question security professionals must ask themselves on a daily basis as they face demands that threaten to explode budgets while offering no guarantee that any of the expensively-assembled defenses will actually work.
The roots of the malaise goes back to the early years of the millennium when enterprises and consumers using Windows 2000 and Windows XP were suddenly ambushed by waves of clever software attacks that warned the world that criminals had floored an evolutionary accelerator pedal. By the time XP and Windows received its first major security upgrade in the form of Service Pack 2 in 2004, it was becoming clear that security had entered an unsettling era that might take decades to play out.