Executive Perspectives

Get insights into the latest security threats and hear from McAfee executives on how our corporate values help McAfee combat those threats.

What Is Your Customer Data Worth?
How to make sense of the market for stolen information. Personal data about you, me, and, most...
Understand the Dangers of Hardware & Firmware Vulnerabilities
In 2015, attackers started using hardware, firmware, and BIOS as an element of their attack, and we...
The New and Next at McAfee
This blog was written by Chris Young, McAfee’s former CEO. At McAfee we’re re-defining how we envision...
How Is Your Data Getting Out?
It’s 11:00 p.m. Do you know where your data is? Most reports on data theft events concentrate...
Your “Check Security” Light is On
Please restart your car in safe mode Your car may not get a “Check Security” light in...
Vulnerable From Below: Attacking Hypervisors Using Firmware And Hardware
Malicious attacks with firmware privileges can compromise an entire system, so it is especially important to apply...
What Morpho Means: Why Hackers Target Intellectual Property And Business
A quiet, professional cyberespionage group steals what every company wants to keep secret: valuable information that drives...
Root of Trust vs. Root of Evil: Part 1
Regulatory compliance is an unloved cost of goods—an expense to be managed, like cafeteria subsidies or fleet...
Cyber Resilience And Spear Phishing
Balanced security capability, defense in depth, integrated countermeasures, and a threat-intelligence strategy are critical to defending your...
An Effective Community Is More Than Just An Online Forum
It is important to develop a strong base of contributors who can communicate effectively, answer questions, and...
It’s a Digital World…We Just Live In It!
This blog post was written by Penny Baldwin. The information age, the digital age, one thing’s for...
Application Layer Exfiltration Protection: A New Perspective on Firewalls
Organizations must adopt a new way of thinking about safeguarding sensitive data from theft and unauthorized exfiltration....
121 - 132 of 160
Back to top