marzo 29, 2018
At one point in my career, I was responsible for launching massive websites. We’d talk about when and how we flip the switch to launch the new website. At least once during every project someone would ask me who got to flip the switch, as though we would have a dignitary (or them?) do it. But depending on the year, the flipping on of a website was handled through technology and not very dramatic and not with the fanfare the non-technologists hoped for. (Dimming lights? Fireworks? It was New York and it was publishing, so there was often beer and wine and maybe T-shirts after, but everyone went home and slept.)
And now we have May 25th coming around the corner. The other day, I got a picture in a text from a colleague of a can of sardines. It took me a minute to realize the expiration was May 25. So, other than the sardines, what happens? Are we done?
First the bad news: We won’t ever be done. GDPR requires constant diligence for its principles, recurring reviews of the processes we’v..
marzo 29, 2018
As spring blossoms into full-force, millions of people will start to shed the heavy baggage and gear that kept them warm during winter by partaking in a tried and true practice: spring cleaning. While whipping yourself into a cleaning frenzy around your home, take a moment to extend your spring cleaning efforts into your digital environments as well. And there’s no better time to kick off a digital spring cleaning than during World Backup Day.
What exactly is World Backup Day? I’m glad you asked.
In today’s day and age, data is basically digital gold. It’s imperative to ensure your information is organized and backed up—not just for peace-of-mind, but to protect yourself against potential malware and ransomware threats. Still, a large number of people have never backed up their files, leaving themselves vulnerable to losing everything. In fact, this has become such a systemic problem that a whole day has been devoted to reversing this trend: World Backup Day. One of the main goals of..
marzo 28, 2018
Is it time to #deleteFacebook? Facebook’s long line of dramas has many of us rethinking our dependence on Mark Zuckerberg’s largest social media platform. While many of us were alarmed at the fake news allegations last year, the recent scandal with Cambridge Analytica has us genuinely spooked and now asking ourselves this question.
The fact that Facebook allowed British data analysis firm Cambridge Analytica to tap the Facebook profiles of more than 50 million users without their knowledge has many of us questioning both our – and our children’s – relationship with the social media platform. How compromised is our privacy? What’s really happening with our data? Is our every online move really being monitored?
The immediate reaction of many is to delete their Facebook accounts and insist their kids do the same. When news broke of the Cambridge Analytica scandal, the #deleteFacebook hashtag trended heavily on Twitter. Many high profile tech types deleted their personal and business Fac..
marzo 27, 2018
The McAfee Advanced Threat Research team recently published an article about threats to automobiles on the French site JournalAuto.com. Connected cars are growing rapidly in number and represent the next big step in personal transportation. Auto sales are expected to triple between 2017 and 2022, to US$155.9 billion from $52.5 billion, according to PwC France. Realizing this increase is a huge challenge for car companies as well as for IT security firms.
Through multiple added functions, from Wi-Fi and external connections to driving assistance and autonomous operations, connected cars will very soon need strong security to avoid any intrusions that could endanger drivers, passengers, and others.
Modern cars are exposed to security risks just as are other connected devices. Let’s look at current and future threats in the automotive security field.
The following diagram shows the main risks:
Personal Data and Tracking
Connected cars record a lot of information about t..
marzo 27, 2018
The world is becoming increasingly connected- with locks for you home controlled on your smartphone; CCTV cameras in every room that allow you to keep tabs on your home when you are out; smartphones that help you work, run and plan activities; smart TVs that allow you to connect to the internet; smart refrigerators that take stock of your grocery and place orders with the supermarket; games that can keep you glued to your screen for hours- the list is ever growing.
We all enjoy this connected lifestyle, it has made the world a global village and daily chores so much easier and faster. But there are some caveats attached. We tend to forget that in the virtual world, your safety and privacy depends a lot on you and the precautions you take. Else you end up sharing Too Much Information about yourself and your family, making you a likely candidate for ID theft and phishing.
This is exactly what a new global McAfee survey titled New Security Priorities in An Increasingly Connected World d..
marzo 27, 2018
Everybody’s got a device. And the data on that device is moving into the public cloud. Massive amounts of data. In a world of massive amounts of data, who’s the traffic cop? The Security Operation Center (SOC).
But these days the daily flow of data traffic resembles a Formula One race car going full out, and some traffic monitors are a single cop on the beat.
Research shows this analogy is not far off: 25% of security events go unanalyzed. And 39% of cybersecurity organizations manually collect, process, and analyze external intelligence feeds.
Think about this. At the dawn of the Digital Century, more than a third of all companies are approaching cybersecurity manually.
This is not sustainable.
In short, there are simply not enough people to keep up with the security challenges. But it’s not a question of training or hiring more people. The idea is for humans to do less and machines to do more. Automating threat defense has many advantages: speed, the ability to learn, and the ab..
marzo 27, 2018
In security operations, we frequently talk about the difficulties in separating the signal from the noise to detect legitimate threats and disregard false alarms. Data overload is a common problem and triage becomes a critical skill to hone and develop.
As the chief information security officer (CISO) for McAfee, I am aware at multiple levels of the risks that come from a failure to focus on the right thing. If one of our security operations center (SOC) analysts fails to notice multiple login attempts by the same user from different countries in a short span of time, it could cost us both valuable company data and our reputation in the industry.
For these reasons, McAfee announced major enhancements today to our security operations portfolio in our security information and event management (SIEM) and Security Analytics product lines – enhancements that the McAfee Information Security team I am proud to lead helped to road-test. We also announced that our state-of-the-art converged p..