-
A Third of UK Businesses Experience Cyber-Attacks at Least Once a Week
PRIVACY PRIVACY Around two in five businesses experienced breaches or cyber-attacks in the past 12 months Read More
-
Introducing Personal Data Cleanup
PRIVACY PRIVACY We’re excited to announce the release of McAfee’s Personal Data Cleanup, a new feature that finds and removes your personal info from data brokers and people search sites. Now, you can feel more confident by removing personal info from data broker sites and keeping it from being collected, sold, and used to: advertise products to…
-
AT&T Cybersecurity earns four Cybersecurity Excellence Awards
PRIVACY PRIVACY Will Eborall, Asst VP, AT&T Cybersecurity and Edge Solutions Product Management, co-authored this blog. The AT&T Cybersecurity team’s unwavering focus on managing risk while maximizing customer experience earns high marks from security experts and customers alike. The team garnered some well-earned official recognition of the quality of flexible services they run with the…
-
NCSC: Time to Rethink Russian Supply Chain Risks
PRIVACY PRIVACY Kremlin coercion and sanctions could impact Western customers Read More
-
Why metrics are crucial to proving cybersecurity programs’ value
PRIVACY PRIVACY As solutions to managing cybersecurity threats increase, surprisingly few metrics are available on how well these methods work to secure organizational assets. The National Institute of Standards and Technology (NIST) has pioneered information security performance measurement models that can produce metrics. (Note: NIST’s work in this area is now being updated.) Aside from…
-
Why authentication is still the CISO’s biggest headache
PRIVACY PRIVACY Authentication remains one of the most painstaking challenges faced by CISOs in organizations large and small. This longstanding, fundamental element of security continues to cause headaches for security leaders seeking to identify and authorize users and devices often spread across different states, borders, and time zones. Meanwhile, persistent risks associated with ineffective authentication…
-
4 ways attackers target humans to gain network access
PRIVACY PRIVACY Every day, I see the failure in our technology. I’m sure you see it as well. Since the day we started receiving email, we have failed at protecting recipients from scams, phishes and other email messages that they don’t want. I remember the infamous email-based computer worm, the “ILOVEYOU virus,” that infected fellow…
-
Log4Shell Used in a Third of Malware Infections
PRIVACY PRIVACY Software supply chain attacks realize researchers’ worst fears Read More
-
Attackers Steal $618m From Crypto Firm
PRIVACY PRIVACY Cyber-heist could be biggest ever recorded Read More
-
What is Shodan? The search engine for everything on the internet
PRIVACY PRIVACY Shodan is a search engine for everything on the internet — web cams, water treatment facilities, yachts, medical devices, traffic lights, wind turbines, license plate readers, smart TVs, refrigerators, anything and everything you could possibly imagine that’s plugged into the internet (and often shouldn’t be). Google and other search engines, by comparison, index…