FireEye

Displaying 1 - 10 of 48 results

  • Exercising the C-Suite: Gain IR Muscle

    Webcasts // Jan 2016 // provided by FireEye

    In this webinar, Mandiant Principal Consultant Matt Shaffer will examine how organizations involve their C-Suite in simulations and game activities to build awareness of best practices and common pitfalls. Join this webinar to learn how you can fully engage your C-suite and improve your organization’s security posture.

    Watch Now
  • Top 10 Security Predictions for 2016

    Webcasts // Jan 2016 // provided by FireEye

    It’s been a year of more-more cyber attacks in more industries. And health care has emerged as the target of the year, affecting the lives of millions of customers and employees. 2015 has also been the year of international cyber treaties to help curb attacks. What will the new ...

    Watch Now
  • Enemies in Our Midst: The Benefits of Compromise Assessments

    White Papers // Jan 2016 // provided by FireEye

    It’s not a question of if your organization will be breached. It’s a question of when. Most attackers remain active in environments for a significant amount of time before being discovered. And only a small percentage of organizations discover the presence of advanced attackers themselves—most need to be informed by ...

    Download Now
  • Webinar: The Move to Mobile-Android and iOS Attacks

    Webcasts // Jan 2016 // provided by FireEye

    Cyber attacks that target mobile apps, such as Masque attacks, are on the rise—so much so that mobile is now the fastest growing threat vector to the enterprise. Get insights into a threat group that exploit using the iOS Masque attack, and be vigilant against cyber attacks on mobile ...

    Watch Now
  • Pinpointing Targets: Exploiting Web Analytics to Ensnare Victims

    White Papers // Jan 2016 // provided by FireEye

    In this Threat Intelligence report examining over 100 websites that have been compromised due to threat actors that exploit Web Analytics - technologies to collect, analyze, and report data from the web—on compromised websites to passively collect information from website visitors – It allows cyber criminals to collect vast amounts ...

    Download Now
  • Zero-Day Danger: A Survey of Zero-Day Attacks and What They Say About the Traditional Security Model

    White Papers // Jan 2016 // provided by FireEye

    Zero-day threats are everywhere. Not surprisingly, zero-day exploits are heavily used in targeted attacks. The typical zero-day attack lasts an average of eight months. That gives attacks ample time to steal organizations' most valuable assets. Find out more about zero-day attacks and how organisations should reassess their security posture.

    Download Now
  • You’ve been hacked. Now what?

    Webcasts // Dec 2015 // provided by FireEye

    A network breach is not a matter of if, but when. However many companies are still a long way from having a network security posture to effectively manage or respond to today’s evolving cyber threats. Having security systems in place within your network architecture is only half the battle; todays ...

    Watch Now
  • APT28: A Window into Russia’s Cyber Espionage Operations?

    White Papers // Nov 2015 // provided by FireEye

    Russia has long been a whispered frontrunner among capable nations for performing sophisticated network operations. In this paper, we discuss a threat group whose malware is already fairly well-known in the cybersecurity community. FireEye believes that this is an advanced persistent threat (APT) group engaged in espionage against political and ...

    Download Now
  • Russian Cyber Threat Groups - Could they compromise your Twitter Handle?

    Webcasts // Nov 2015 // provided by FireEye

    Cyber threat groups frequently design innovative ways to cover their tracks. In early 2015, a new malware emerged, which the analysts are calling HAMMERTOSS, from an advanced persistent threat (APT) group. The Russian attacker group that FireEye knows as APT29, employs HAMMERTOSS to compromise its targets. Using a variety of ...

    Watch Now
  • M-Trends Report 2015 - A View from the Front Lines

    White Papers // Jun 2015 // provided by FireEye

    Talking about the threat landscape is no substitute for experiencing it first-hand. “M-Trends 2015: A View from the Front Lines,” distills the insights gleaned from hundreds of Mandiant incident response investigations in more than 30 industry sectors. The report provides key insights, statistics, and case studies illustrating how the tools ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?