Digital babies

The Connected Lives of Babies: Protecting Their First Footprints in the Digital World A baby can leave their first internet footprints even before they’re born. The fact is that children start creating an identity online before they even put a little pinky on a device, let alone come home for the first time. That “Hello, […]

The post The Connected Lives of Babies: Protecting Their First Footprints in the Digital World appeared first on McAfee Blogs.

Read More The Connected Lives of Babies: Protecting Their First Footprints in the Digital World

Parler, the beleaguered social network advertised as a “free speech” alternative to Facebook and Twitter, has had a tough month. Apple and Google removed the Parler app from its stores, and Amazon blocked the platform from using its hosting services. Parler has since found a home in DDoS-Guard, a Russian digital infrastructure company. But now it appears DDoS-Guard is about to be relieved of more than two-thirds of the Internet address space the company leases to clients — including the Internet addresses currently occupied by Parler.

Read More DDoS-Guard To Forfeit Internet Space Occupied by Parler

Ransomware Alert

Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021 The holidays have come and gone, and students returned to the virtual classroom. But according to the FBI, cyberattacks are likely to disrupt online learning in the new year. As of December 2020, the FBI, Cybersecurity and Infrastructure Security Agency (CISA), and […]

The post Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021 appeared first on McAfee Blogs.

Read More Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021

Webroot BrightCloud® Threat Intelligence relies on the collective power of millions of devices working together. But what sometimes gets lost is the actual humans behind bringing this technology to market. In this Employee Spotlight, we talk to Account Development Executive, Jordan Gray, who works with C-level executives to integrate threat intelligence solutions within their environments. […]

The post Employee Spotlight: The Human Faces Behind Artificial Intelligence appeared first on Webroot Blog.

Read More Employee Spotlight: The Human Faces Behind Artificial Intelligence

Holiday Video Chat

  The Connected Lives of Babies: Protecting Their First Footprints in the Digital World, Part Two Picture an infant with a credit card. In her name. With a $10,000 limit. Well, it happens. As recent as 2017, it was estimated that more than 1 million children in the U.S. were victims of identity theft. Of […]

The post The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part Two appeared first on McAfee Blogs.

Read More The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part Two

Your employees encounter potential cyber security threats on a daily basis. Perhaps there’s a new face in the office that they don’t recognise, or a new password they need to remember, or a database of sensitive information that they need to upload onto the Cloud. In The Psychology of Information Security, Leron Zinatullin explains how employees respond to those challenges and explains why they make the decisions they do. For example, he found that employees usually don’t have a solid understanding of information security or their obligations to protect information. In the rare cases where employees are aware of and follow

The post How your staff make security decisions: The psychology of information security appeared first on IT Governance UK Blog.

Read More How your staff make security decisions: The psychology of information security

Digital from birth

The Connected Lives of Babies: Protecting The First Footprints in the Digital World, Part One A baby can leave their first footprints internet even before they’re born. The fact is that children start creating an identity online before they even put a little pinky on a device, let alone come home for the first time. […]

The post The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part 1 appeared first on McAfee Blogs.

Read More The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part 1

We’re not going to lie: implementing an ISO 27001-compliant ISMS (information security management system) can be a challenge. But as the saying goes, nothing worth having comes easy, and ISO 27001 is definitely worth having. If you’re just getting started with ISO 27001, we’ve compiled this 9 step implementation checklist to help you along the way. Step 1: Assemble an implementation team Your first task is to appoint a project leader to oversee the implementation of the ISMS. They should have a well-rounded knowledge of information security as well as the authority to lead a team and give orders to

The post ISO 27001 checklist: a step-by-step guide to implementation appeared first on IT Governance UK Blog.

Read More ISO 27001 checklist: a step-by-step guide to implementation

A little bit of a change of pace this week with the video being solely on the events unfolding around removing content, people and even entire platforms from the internet. These are significant events in history, regardless of your political persuasion, and they’re likely to have a very long-lasting impact

Read More Weekly Update 226

Depending on your life experiences, the phrase (or country song by Eric Church) “two pink lines” may bring up a wide range of powerful emotions.    I suspect, like many fathers and expecting fathers, I will never forget the moment I found out my wife was pregnant.  You might recall what you were doing, or where […]

The post Two Pink Lines appeared first on McAfee Blogs.

Read More Two Pink Lines

Today, we celebrate the life and legacy of Dr. Martin Luther King Jr. Dr. King diligently dedicated his life to dismantling systemic racism affecting marginalized groups and leading a peaceful movement to promote equality for all Americans, irrespective of color and creed. He leaves behind a legacy of courage, strength, perseverance, and a life-long dedication […]

The post Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community appeared first on McAfee Blogs.

Read More Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community

CES 2021

Typically, the International Consumer Electronics Show (CES) gives us a sense of where technology is going in the future. However, this year’s show was arguably more about technology catching up with how the COVID-19 pandemic has reshaped our lives. While gathering in person was not an option, we still had the opportunity to witness incredible […]

The post CES 2021: Highlights From the “Cleanest” Show Yet! appeared first on McAfee Blogs.

Read More CES 2021: Highlights From the “Cleanest” Show Yet!

As we gratefully move forward into the year 2021, we have to recognise that 2020 was as tumultuous in the digital realm as it has in the physical world. From low level fraudsters leveraging the pandemic as a vehicle to trick victims into parting with money for non-existent PPE, to more capable actors using malware […]

The post A Year in Review: Threat Landscape for 2020 appeared first on McAfee Blogs.

Read More A Year in Review: Threat Landscape for 2020

Top gaming companies positioned to be next major cyberattack target After healthcare and higher education emerged as lucrative targets for cyberattacks in 2020, researchers have identified the video gaming industry as another key target. By scouring the dark web for stolen data belonging to any of the top 25 largest gaming firms, over a million […]

The post Cyber News Rundown: Gaming Industry in Crosshairs of Cybercriminals appeared first on Webroot Blog.

Read More Cyber News Rundown: Gaming Industry in Crosshairs of Cybercriminals

“It’s definitely dead,” says Tyler Moffitt, security analyst at Carbonite + Webroot, OpenText companies. “At least,” he amends, “for now.” Maze ransomware, which made our top 10 list for Nastiest Malware of 2020 (not to mention numerous headlines throughout the last year), was officially shut down in November of 2020. The ransomware group behind it […]

The post Maze Ransomware is Dead. Or is it? appeared first on Webroot Blog.

Read More Maze Ransomware is Dead. Or is it?

Top Cyber Security Threats to Look Out for in 2021 2020 was unexpectedly  defined by a global pandemic. Throughout the year, we have all had to figure out how to best live our lives online – from working from home to distance learning to digitally connecting with loved ones.  As 2020 comes to a close, we […]

The post Top Security Threats to Look Out for in 2021 appeared first on McAfee Blogs.

Read More Top Security Threats to Look Out for in 2021

The December 2020 revelations around the SUNBURST campaigns exploiting the SolarWinds Orion platform have revealed a new attack vector – the supply chain – that will continue to be exploited. The ever-increasing use of connected devices, apps and web services in our homes will also make us more susceptible to digital home break-ins. This threat […]

The post 2021 Threat Predictions Report appeared first on McAfee Blogs.

Read More 2021 Threat Predictions Report

If you???re looking to start or optimize an AppSec program in 2021, the Forrester WaveTM report is a good place to begin your research. The report not only details essential elements of AppSec solutions, but also ranks 12 static application security te…

Read More Veracode Named a Leader in The Forrester Wave: Static Application Security Testing, Q1 2021

Cyber security risk assessments are essential for organisations to protect themselves from malicious attacks and data breaches. After all, it’s only once you’re aware of the ways you’re vulnerable that you can put appropriate defences in place. But what exactly does a risk assessment do? Essentially, it helps you answer these three questions: Under what scenarios is your organisation under threat? How damaging would each of these scenarios be? How likely is it that these scenarios will occur? To complete a risk assessment, you must give each scenario that you identify a ‘risk score’ based on its potential damage and

The post A brief guide to cyber security risk assessments appeared first on IT Governance UK Blog.

Read More A brief guide to cyber security risk assessments

Organizations across the globe have quickly moved to a fast-digital transformation to allow a remote workforce model due to the global pandemic. That has naturally resulted in a multi-fold rise in the IT attack surface of a company.  That’s why security leaders should consider the added risks carried by the remote workforce as well as […]

The post To Which Risks Are A Remote Workforce Exposed? appeared first on CyberDB.

Read More To Which Risks Are A Remote Workforce Exposed?

And we’re finally home. After 8,441km of driving finished off by a comfy flight home whilst the car catches a ride on a carrier, we’re done. I talk about why we didn’t finish the drive in the latter part of this week’s video (basically boiled down to border uncertainties

Read More Weekly Update 225

This post was also written by Darragh McMahon At McAfee, we adhere to a set of core values and principles – We Put the Customer at The Core, We Achieve Excellence with Speed and Agility, We Play to Win or We Don’t Play, We Practice Inclusive Candor and Transparency. And reaching the ISO 27701 enshrines […]

The post McAfee Welcomes its ISO 27701 Certificate! appeared first on McAfee Blogs.

Read More McAfee Welcomes its ISO 27701 Certificate!

NIST’s Cybersecurity for the Internet of Things program has published a summary report—NISTIR 8322—for the July 2020 workshop on the creation of a Federal profile of IoT device cybersecurity requirements. The workshop provided the opportunity to discus…

Read More NIST publishes NISTIR 8322: Workshop Summary Report for “Building the Federal Profile for IoT Device Cybersecurity” Virtual Workshop

Digital transformation continues to accelerate, and with it, businesses continue to modernize their technological environments, leveraging developer-first cloud-native solutions to build, host, and secure their software. At Veracode, we continue to see…

Read More Announcing Veracode in AWS Marketplace: Streamlining Secure Software Development for AWS Customers

XDR (eXtended Detection and Response) is a cybersecurity acronym being used by most vendors today.  It is not a new strategy. It’s been around for a while but the journey for customers and vendors has been slow for many reasons. For McAfee, XDR has been integral to our vision, strategy and design philosophy that has […]

The post The Road to XDR appeared first on McAfee Blogs.

Read More The Road to XDR

It’s a new year! With lots of breaches to discuss already ☹ Ok, so these may not be 2021 breaches but I betcha that by next week’s update there’ll be brand new ones from the new year to discuss. I managed to get enough connectivity in the middle of the Australian

Read More Weekly Update 224

New Years 2021

No doubt, we have a lot to be hopeful for as we step into the New Year. We’ve adapted, survived, and learned to thrive under extraordinary circumstances. While faced with plenty of challenges, families successfully transitioned to working and learning from home like pros. So, as we set our intentions for 2021, we will need […]

The post 4 Ways to Help Your Family Combat Cyber Threats in the New Year appeared first on McAfee Blogs.

Read More 4 Ways to Help Your Family Combat Cyber Threats in the New Year

With 2021 approaching, it is a time to both reflect on the outstanding progress we have each made – personally and professionally, and warmly welcome a new chapter in 2021!   2020 has been one of the most unexpected years in our history. However, despite COVID-19, we had some amazing successes.  January brought McAfee our new CEO – Peter Leav. It’s hard to […]

The post Bring on 2021! appeared first on McAfee Blogs.

Read More Bring on 2021!

Well that’s Christmas down for another year, and a rather different one it was for so many of us around the world. I’m pumping this post out very quickly (a couple of days after recording) whilst midway along a very long drive. I’ll share more about that on my New

Read More Weekly Update 223

Looking Ahead to 2021: The Things We’ll Carry Forward Right now, I’m thinking about how my life changed in 2020. Not so much in the sweeping and upending ways. More in the little ways. I’m thinking about the coping ways. The cobble-it-all-together ways. The little changes to make things work ways. There were plenty.  Now, […]

The post Looking Ahead to 2021: The Things We’ll Carry Forward appeared first on McAfee Blogs.

Read More Looking Ahead to 2021: The Things We’ll Carry Forward

On December 13, 2020, FireEye announced that threat actors had compromised SolarWinds’s Orion IT monitoring and management software and used it to distribute a software backdoor to dozens of that company’s customers, including several high profile U.S. government agencies. Game Changing Attack Vector This campaign is the first major supply chain attack of its kind […]

The post Why SolarWinds-SUNBURST is a Wake up Call appeared first on McAfee Blogs.

Read More Why SolarWinds-SUNBURST is a Wake up Call

McAfee, the device-to-cloud cybersecurity company, announced the winners of its distinguished SIA Partner Awards. The 2020 awards recognize partners who demonstrated innovation, strategic value, and market leadership in their respective market segments which are a complement to the McAfee solution portfolio. 2020 has been a difficult year for everyone that has required organizations to be […]

The post McAfee Security Innovation Alliance 2020 MPOWER Awards appeared first on McAfee Blogs.

Read More McAfee Security Innovation Alliance 2020 MPOWER Awards

2020 has been quite the year for many, and through it all, we’re reflecting on everything we are thankful for. This includes the incredible stories and invaluable perspectives that come from our McAfee team members around the world. As the year ends, we’re counting down the top 10 most read Life at McAfee blog stories. These are the stories from our team members that you love to read, and we love to tell!    10. One Team Member […]

The post 2020 In Review: The Top 10 Most Popular Life at McAfee Blogs appeared first on McAfee Blogs.

Read More 2020 In Review: The Top 10 Most Popular Life at McAfee Blogs

Security awareness training is one of the most straightforward ways to improve a business’ overall resilience against cyberattacks. That is, when you get it just right. Thanks to the disruptions to “normal” work routines that COVID-19 has brought, launching a company-wide training program to teach end users how to avoid phishing scams and online risks […]

The post How to Build Successful Security Awareness Training Programs in 2021 and Beyond appeared first on Webroot Blog.

Read More How to Build Successful Security Awareness Training Programs in 2021 and Beyond

Die Cloud ist und bleibt ein Treiber für die digitale Transformation. Nachdem der Fokus primär auf die Erkennung von Shadow-IT und die Absicherung von SaaS-Diensten lag, wandert nun der Blick auf längerfristige Projekte: Die Migration von ganzen Diensten und Anwendungen in Richtung Cloud. In diesem Podcast sprechen wir daher über die Themen Infrastruktur und Container […]

The post ST25: Absicherung von Cloud-nativen Anwendungen appeared first on McAfee Blogs.

Read More ST25: Absicherung von Cloud-nativen Anwendungen

In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds’s Orion IT monitoring and management software with a trojanized version of SoalrWinds.Orion.Core.BusinessLayer.dll delivered as part of a digitally-signed Windows Installer Patch. The trojanized file delivers a backdoor, dubbed SUNBURST by FireEye (and Solorigate by Microsoft), that communicates to third-party servers for […]

The post How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise appeared first on McAfee Blogs.

Read More How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise