Featured

Contributor:
John E Dunn
September 28th, 2012

Surviving ‘Generation Tech’

Young workers use software differently. This is how it should be.

Out on the front line of security admin, something appears to have gone badly wrong and yet until now barely a voice has been raised in complaint. As business desktops have shifted from Windows XP to Windows 7, it turns out that an unknown number of workers have been quietly running riot on networks using application privileges.

In most cases the symptom is a tiresome rise in User Account Control (UAC) requests that are a feature of Windows 7 security – ‘please let me run this application’ – leaving admins with the chore of working out whether the request is legitimate for the person making it, indeed whether the application should be run at all.

Continue Reading

Collaboration is King

In April we welcomed the return of the McAfee brand, one of the trailblazers in the ongoing battle against cyber crime. In a well-articulated blog post, McAfee CEO, Chris Young, set out the vision and mission of the #NewMcAfee and laid down its ambitious plans to take the business forward and ultimately shape the security marketplace as never before.

Continue Reading


Moving the DXL story forward

Over the course of 2016, McAfee has been progressing a story and supporting a technical strategy that addresses the challenges of a rapidly changing risk landscape.  In recent years at McAfee’s annual security conference, FOCUS, we’ve seen Chris Young, Brian Dye and others mature a narrative that started with more integrated products, and then an integration framework with the Data Exchange Layer (DXL) and now a DXL that’s going to be released as open source.

Continue Reading


Making the “cyber” world a more secure place

Leveraging technology partnerships to drive customer value

New and sophisticated security threats and cyber attacks such as zero-days, “phishing”, and advanced persistent threats are plaguing organizations the world over, directly impacting:

Continue Reading


Building bridges to a more connected security environment

For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were a few bridges here and there but the various islands remained largely inaccessible. It became clear, however, that in this era of rapidly evolving and advanced threats, we needed to find a way to build those bridges, to join the dots and ensure each part of the ‘security archipelago’ is not only connected, but integrated, with open channels of communication.

Continue Reading


The Rise and Rise of ‘Standard’ Mode

User Account Control was a great idea but it has taken privilege management to fulfill its potential

How did computer security get into such a troubled and confused state? It’s a question security professionals must ask themselves on a daily basis as they face demands that threaten to explode budgets while offering no guarantee that any of the expensively-assembled defenses will actually work.

The roots of the malaise goes back to the early years of the millennium when enterprises and consumers using Windows 2000 and Windows XP were suddenly ambushed by waves of clever software attacks that warned the world that criminals had floored an evolutionary accelerator pedal. By the time XP and Windows received its first major security upgrade in the form of Service Pack 2 in 2004, it was becoming clear that security had entered an unsettling era that might take decades to play out.

Continue Reading