Palo Alto launches cloud-native firewall service for AWS
Palo Alto Networks has launched a new, fully managed “next-generation” firewall (NGFW) service in partnership with Amazon Web Services designed to remove the complexities of...
Stalking with an Apple Watch
The malicious uses of these technologies are scary: Police reportedly arrived on the scene last week and found the man crouched beside the woman’s passenger...
A Third of UK Businesses Experience Cyber-Attacks at Least Once a Week
Around two in five businesses experienced breaches or cyber-attacks in the past 12 months Read More
Introducing Personal Data Cleanup
We’re excited to announce the release of McAfee’s Personal Data Cleanup, a new feature that finds and removes your personal info from data brokers and...
AT&T Cybersecurity earns four Cybersecurity Excellence Awards
Will Eborall, Asst VP, AT&T Cybersecurity and Edge Solutions Product Management, co-authored this blog. The AT&T Cybersecurity team’s unwavering focus on managing risk while maximizing...
NCSC: Time to Rethink Russian Supply Chain Risks
Kremlin coercion and sanctions could impact Western customers Read More
Why metrics are crucial to proving cybersecurity programs’ value
As solutions to managing cybersecurity threats increase, surprisingly few metrics are available on how well these methods work to secure organizational assets. The National Institute...
Why authentication is still the CISO’s biggest headache
Authentication remains one of the most painstaking challenges faced by CISOs in organizations large and small. This longstanding, fundamental element of security continues to cause...
4 ways attackers target humans to gain network access
Every day, I see the failure in our technology. I’m sure you see it as well. Since the day we started receiving email, we have...
Log4Shell Used in a Third of Malware Infections
Software supply chain attacks realize researchers' worst fears Read More