cloud security

Cloud computing is a simple way for companies to upscale their operations without incurring huge infrastructural costs. Firms currently use an average of 8 clouds and expect this to increase to around 11 by the end of 2023. The cloud industry is enjoying unprecedented growth and will hit a new high in 2022. Forecasts suggest […]

The post The Importance of Using the Right Cloud Service Provider appeared first on CyberDB.

Read More The Importance of Using the Right Cloud Service Provider

Misconfigured cloud-based databases continue to cause data breaches, millions of database servers are currently exposed across cloud providers. Fugue’s new State of Cloud Security 2020 report reveals that misconfigured cloud-based databases continue to pose a severe security risk to organizations. Cloud misconfiguration remains the top cause of data breaches in the cloud, and the ongoing COVID-19 […]

The post Cloud misconfiguration, a major risk for cloud security appeared first on Security Affairs.

Read More Cloud misconfiguration, a major risk for cloud security

Use of “domain age” is a feature being promoted by various firewall and web security vendors as a method to protect users and systems from accessing malicious internet destinations. The concept is to use domain age as a generic traffic filtering parameter. The thought is that hosts associated with newly registered domains should be either […]

The post Domain Age as an Internet Filter Criteria appeared first on McAfee Blogs.

Read More Domain Age as an Internet Filter Criteria

The global cloud computing market is set to reach $623.3 billion by 2023. The cloud is the ultimate tool in building highly scalable and flexible networks that can be set up in a flash. This offers a great opportunity for businesses looking to avoid high sunk costs in setting up infrastructure or, in phasing out […]

The post Top Benefits of a Cloud Computing Security Solution appeared first on CyberDB.

Read More Top Benefits of a Cloud Computing Security Solution

Organizations across the globe have quickly moved to a fast-digital transformation to allow a remote workforce model due to the global pandemic. That has naturally resulted in a multi-fold rise in the IT attack surface of a company.  That’s why security leaders should consider the added risks carried by the remote workforce as well as […]

The post To Which Risks Are A Remote Workforce Exposed? appeared first on CyberDB.

Read More To Which Risks Are A Remote Workforce Exposed?

This week, we announced the latest release of MVISION Unified Cloud Edge, which included a number of great data protection enhancements. With working patterns and data workflows dramatically changed in 2020, this release couldn’t be more timely. According to a report by Gartner earlier in 2020, 88% of organizations have encouraged or required employees to […]

The post Finally, True Unified Multi-Vector Data Protection in a Cloud World appeared first on McAfee Blogs.

Read More Finally, True Unified Multi-Vector Data Protection in a Cloud World

Every day, new apps are developed to solve problems and create efficiency in individuals’ lives.  Employees are continually experimenting with new apps to enhance productivity and simplify complex matters. When in a pinch, using DropBox to share large files or an online PDF editor for quick modifications are commonalities among employees. However, these apps, although useful, may not be sanctioned or observable by an IT department. The rapid adoption of […]

The post 3 Reasons Why Connected Apps are Critical to Enterprise Security appeared first on McAfee Blogs.

Read More 3 Reasons Why Connected Apps are Critical to Enterprise Security

Government and Private Sector organizations are transforming their businesses by embracing DevOps principles, microservice design patterns, and container technologies across on-premises, cloud, and hybrid environments. Container adoption is becoming mainstream to drive digital transformation and business growth and to accelerate product and feature velocity. Companies have moved quickly to embrace cloud native applications and infrastructure […]

The post Securing Containers with NIST 800-190 and MVISION CNAPP appeared first on McAfee Blogs.

Read More Securing Containers with NIST 800-190 and MVISION CNAPP

The move to a distributed workforce came suddenly and swiftly. In February 2020, less than 40% of companies allowed most of their employees to work from home one day a week. By April, 77% of companies had most of their employees working exclusively from home. Organizations have been in the midst of digital transformation projects […]

The post Think Beyond the Edge: Why SASE is Incomplete Without Endpoint DLP appeared first on McAfee Blogs.

Read More Think Beyond the Edge: Why SASE is Incomplete Without Endpoint DLP

Malicious actors are increasingly taking advantage of the burgeoning at-home workforce and expanding use of cloud services to deliver malware and gain access to sensitive data. According to an Analysis Report (AR20-268A) from the Cybersecurity and Infrastructure Security Agency (CISA), this new normal work environment has put federal agencies at  risk of falling victim to […]

The post How CASB and EDR Protect Federal Agencies in the Age of Work from Home appeared first on McAfee Blogs.

Read More How CASB and EDR Protect Federal Agencies in the Age of Work from Home

There are new and expanding opportunities for women’s participation in cybersecurity globally as women are present in greater numbers in leadership. In recent years, the international community has recognized the important contributions of women to cybersecurity, however, equal representation of women is nowhere near a reality, especially at senior levels. The RSA Conference USA 2019 held […]

The post SPOTLIGHT: Women in Cybersecurity appeared first on McAfee Blogs.

Read More SPOTLIGHT: Women in Cybersecurity

McAfee MVISION Cloud was the first to market with a CASB solution to address the need to secure corporate data in the cloud. Since then, Gartner has published several reports dedicated to the CASB market, which is a testament to the critical role CASBs play in enabling enterprise cloud adoption. Today, Gartner named McAfee a […]

The post McAfee Named a Leader in the 2020 Gartner Magic Quadrant for CASB appeared first on McAfee Blogs.

Read More McAfee Named a Leader in the 2020 Gartner Magic Quadrant for CASB

Most businesses cannot survive without being connected to the internet or the cloud. Websites and cloud services enable employees to communicate, collaborate, research, organize, archive, create, and be productive. Yet, the digital connection is also a threat. External attacks on cloud accounts increased by an astounding 630% in 2019. Ransomware and phishing remain major headaches […]

The post Catch the Most Sophisticated Attacks Without Slowing Down Your Users appeared first on McAfee Blogs.

Read More Catch the Most Sophisticated Attacks Without Slowing Down Your Users

You’ve more than likely heard the phrase “with great power comes great responsibility.” Alternatively called the “Peter Parker Principle” this phrase became well known in popular culture mostly due to Spider-Man comics and movies – where Peter Parker is the protagonist. The phrase is so well known today that it actually has its own article […]

The post With No Power Comes More Responsibility appeared first on McAfee Blogs.

Read More With No Power Comes More Responsibility

Almost all businesses nowadays use web applications for their targeted growth, but these apps’ security is mostly compromised if proper steps are not taken. During the web application development, all other features are given time and preference, but very few pay attention to the web application security they deserve. The vulnerabilities in your web application […]

The post Best Security Practices to Protect your Web Application from Future Threats appeared first on CyberDB.

Read More Best Security Practices to Protect your Web Application from Future Threats

Over the last few months, Zero Trust Architecture (ZTA) conversations have been top-of-mind across the DoD. We have been hearing the chatter during industry events all while sharing conflicting interpretations and using various definitions. In a sense, there is an uncertainty around how the security model can and should work. From the chatter, one thing […]

The post Data-Centric Security for the Cloud, Zero Trust or Advanced Adaptive Trust? appeared first on McAfee Blogs.

Read More Data-Centric Security for the Cloud, Zero Trust or Advanced Adaptive Trust?

Securing documents before cloud Before the cloud, organizations would collaborate and store documents on desktop/laptop computers, email and file servers. Private cloud use-cases such accessing and storing documents on intranet web servers and network attached storage (NAS) improved the end-user’s experience. The security model followed a layered approach, where keeping this data safe was just […]

The post “Best of Breed” – CASB/DLP and Rights Management Come Together appeared first on McAfee Blogs.

Read More “Best of Breed” – CASB/DLP and Rights Management Come Together

2020 has seen cloud adoption accelerate with Microsoft Teams as one of the fastest growing collaboration apps, McAfee customers use of Teams increased by 300% between January and April 2020. When we looked into Teams use in more detail in June, we found these statistics, on average, in our customer base:   Teams Created                                                                 367 […]

The post Top 10 Microsoft Teams Security Threats appeared first on McAfee Blogs.

Read More Top 10 Microsoft Teams Security Threats

Are you prepared to detect and defend against attacks that target your data in cloud services, or apps you’ve built that are hosted in the cloud?  Background  Nearly all enterprises and public sector customers we work with have enabled cloud use in their organization, with many seeing a 600%+ increase1 in use in the March-April timeframe of 2020, when the […]

The post MITRE ATT&CK for Cloud: Adoption and Value Study by UC Berkeley CLTC appeared first on McAfee Blogs.

Read More MITRE ATT&CK for Cloud: Adoption and Value Study by UC Berkeley CLTC

McAfee MVISION Cloud for Microsoft Teams, now offers secure guest user collaboration features allowing the security admins to not only monitor sensitive content posted in the form of messages and files within Teams but also monitor guest users joining Teams to remove any unauthorized guests joining Teams.   Working from home has become a new reality for many, as more and more […]

The post MVISION Cloud for Microsoft Teams appeared first on McAfee Blogs.

Read More MVISION Cloud for Microsoft Teams

The McAfee team is very proud to announce that once again McAfee was named a Gartner Peer Insights Customers’ Choice for SIEM for its McAfee Enterprise Security Manager (ESM) Solution, a recognition of high satisfaction from a number of reviews by verified end-user professionals. We are most appreciative of our customers who support our solutions and share […]

The post McAfee ESM Named a 2020 Gartner Peer Insights Customers’ Choice for SIEM appeared first on McAfee Blogs.

Read More McAfee ESM Named a 2020 Gartner Peer Insights Customers’ Choice for SIEM

“Features are a nice to have, but at the end of the day, all we care about when it comes to our web and cloud security is architecture.” – said no customer ever. The fact is that nobody likes to talk about architecture when shopping for the latest and greatest cyber security technology, and most […]

The post Transform your Architecture for the Cloud with MVISION UCE and SD-WAN appeared first on McAfee Blogs.

Read More Transform your Architecture for the Cloud with MVISION UCE and SD-WAN