McAfee is the device-to-cloud cybersecurity company. Inspired by the power of working together, McAfee creates business and consumer solutions that make our world a safer place for the benefit of all.
Our holistic, automated open security platform allows all your disparate products to co-exist, communicate, and share threat intelligence with each other anywhere in the digital landscape. Where machine automation is converged with human intelligence so you can streamline workflows more efficiently. Where your team is freed from unnecessary operational burden and is empowered to strategically fight adversaries. Where you can orchestrate all things security through a single management system. Where all your security products adapt to new threats skilfully and work synergistically to increase protection, and speed up detection and correction—across the entire threat defence lifecycle.
Recognizing the significant role SSE is filling in cybersecurity, Gartner® has published its first ever Magic Quadrant report for SSE. We are honored to announce that the McAfee Enterprise SSE Portfolio has been recognized as a Leader for
Symphony Technology Group Announces the Launch of Extended Detection and Response Provider, Trellix SAN JOSE, Calif., January 19, 2022—(BUSINESS WIRE)— Symphony Technology Group (STG) announced today the launch of Trellix, a new business
A Cloud access security broker, or CASB, is cloud-hosted software or on-premises software or hardware that act as an intermediary between users and cloud service providers. The ability of a CASB to address gaps in security extends across
The vulnerability, CVE-2021-1732, is a win32k window object type confusion leading to an OOB (out-of-bounds) write which can be used to create arbitrary memory read and write capabilities within the Windows kernel (local Elevation of Privilege
CVE-2021-44228 – Apache Releases Log4j Version 2.15.0 to Address Critical RCE Vulnerability Under Exploitation. Threat Summary Log4j/Log4shell is a remote code execution vulnerability (RCE) in Apache software allowing attackers
What is it? The vulnerability exists in the way the Java Naming and Directory Interface (JNDI) feature resolves variables. When a JNDI reference is being written to a log, JNDI will fetch all requirements to resolve the variable. To
Threat Summary On November 17, 2021, The US Cybersecurity & Infrastructure Security Agency (CISA) pushed an Alert entitled “Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in
To better serve its customers and secure its own environments, one global technology provider decided to expand its existing on-premises data loss protection (DLP) and web protection with a comprehensive and robust cloud security strategy based
In June 2021 the G7 economies urged countries that may harbor criminal ransomware groups to take accountability for tracking them down and disrupting their operations. Let’s review the high severity campaigns and threat profiles added to