FireEye
Displaying 1-10 of 10 results
-
Webinar: Advanced Malware And APT Attacks
Watch this webinar to learn: * What are the traits of Advanced Persistent Threats (APT)? * What are the infection vectors? * What are the advanced techniques? * Who are the threat actors?
Provided By FireEye
-
Webinar: How Client-side Attacks Evade Traditional Security Controls
Hosted by Ben Wilson, Senior Systems Engineer, CISSP, GXPN Bypassing traditional security controls is becoming a commodity. Hear more and watch a demo about how this happens, and what you can do to protect your network.
Provided By FireEye
-
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks - A Guide for CIOs, CFOs, and CISOs
Enterprises and government agencies are under virtually constant attack today. Significant breaches at RSA, Global Payments, ADP, Symantec, International Monetary Fund, and a number of other organizations have made headlines. 95% of organizations are routinely compromised, with the theft of intellectual property, customer records, and other sensitive data increasingly common.
...Provided By FireEye
-
EMA: Closing Critical IT Security Gaps for More Effective Defense
An ENTERPRISE MANAGEMENT ASSOCIATES (EMA) White Paper.
In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate. Organizations have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In...Provided By FireEye
-
Cybersecurity Strategies for Small to Medium-Sized Businesses
Small to medium-sized businesses are essential to the global economy. They contribute $3.8 trillion annually to the U.S. private-sector GDP (Gross Domestic Product) alone, which ranks them as the equivalent of the world's fourth-largest country. And many of the challenges faced by today's small to medium-sized businesses are no different...
Provided By FireEye
-
eBook: Definitive Guide to Next-Generation Threat Protection
Winning the War Against the New Breed of Cyber Attacks. Despite the over $20 billion invested in IT security technology last year, countless enterprises and government agencies have fallen victim to cyber attacks of incredible sophistication and complexity. This all points to the singular resounding reality: the next generation of...
Provided By FireEye
-
Advanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks
Traditional defenses are increasingly becoming policy enforcement points rather than robust defenses against cyber intrusions. To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive, and real-time. Through continuous analysis of suspicious code throughout the attack lifecycle and blocking of malware communications across...
Provided By FireEye
-
Spear Phishing: Avoid Becoming a Trophy Phish
Unique phishing attacks surge worldwide according to the Anti-Phishing Working Group. Advanced targeted attacks, like spear phishing, are fast becoming the norm. Spear phishing has especially become a successful tactic that hackers use to exploit networks and trigger an attack that can lead to catastrophic financial, operational, and reputation risks....
Provided By FireEye
-
Spear Phishing Attacks: Why They are Successful and How to Stop Them
Spear phishing is on the rise - because it works. Cyber criminals have moved from broad, scattershot attacks to advanced targeted attacks like spear phishing. This has proven to be highly effective with serious consequences to victim organizations, requiring enterprises to find a way to more effectively combat evolving threats....
Provided By FireEye
-
Unraveling Web Malware
Security researchers and IT administrators have recently witnessed a rapid rise in the use of Web-based blended threats-for example, dangerous (and potentially obfuscated) JavaScript and ActiveX code-to exploit client browsers and operating systems. The rise coincides with the increasing use of Web 2.0 technologies that allow for user-contributed content, syndicated...
Provided By FireEye
-
Spear Phishing: Avoid Becoming a Trophy Phish
Unique phishing attacks surge worldwide according to the Anti-Phishing Working Group. Advanced targeted attacks, like spear phishing, are fast becoming the norm. Spear phishing has especially become a successful tactic that hackers use to exploit networks and trigger an attack that can lead to catastrophic financial, operational, and reputation risks....
Provided By FireEye
-
Spear Phishing Attacks: Why They are Successful and How to Stop Them
Spear phishing is on the rise - because it works. Cyber criminals have moved from broad, scattershot attacks to advanced targeted attacks like spear phishing. This has proven to be highly effective with serious consequences to victim organizations, requiring enterprises to find a way to more effectively combat evolving threats....
Provided By FireEye
-
Advanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks
Traditional defenses are increasingly becoming policy enforcement points rather than robust defenses against cyber intrusions. To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive, and real-time. Through continuous analysis of suspicious code throughout the attack lifecycle and blocking of malware communications across...
Provided By FireEye
-
eBook: Definitive Guide to Next-Generation Threat Protection
Winning the War Against the New Breed of Cyber Attacks. Despite the over $20 billion invested in IT security technology last year, countless enterprises and government agencies have fallen victim to cyber attacks of incredible sophistication and complexity. This all points to the singular resounding reality: the next generation of...
Provided By FireEye
-
EMA: Closing Critical IT Security Gaps for More Effective Defense
An ENTERPRISE MANAGEMENT ASSOCIATES (EMA) White Paper.
In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate. Organizations have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In...Provided By FireEye
-
Cybersecurity Strategies for Small to Medium-Sized Businesses
Small to medium-sized businesses are essential to the global economy. They contribute $3.8 trillion annually to the U.S. private-sector GDP (Gross Domestic Product) alone, which ranks them as the equivalent of the world's fourth-largest country. And many of the challenges faced by today's small to medium-sized businesses are no different...
Provided By FireEye
-
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks - A Guide for CIOs, CFOs, and CISOs
Enterprises and government agencies are under virtually constant attack today. Significant breaches at RSA, Global Payments, ADP, Symantec, International Monetary Fund, and a number of other organizations have made headlines. 95% of organizations are routinely compromised, with the theft of intellectual property, customer records, and other sensitive data increasingly common.
...Provided By FireEye
-
Webinar: Advanced Malware And APT Attacks
Watch this webinar to learn: * What are the traits of Advanced Persistent Threats (APT)? * What are the infection vectors? * What are the advanced techniques? * Who are the threat actors?
Provided By FireEye
-
Webinar: How Client-side Attacks Evade Traditional Security Controls
Hosted by Ben Wilson, Senior Systems Engineer, CISSP, GXPN Bypassing traditional security controls is becoming a commodity. Hear more and watch a demo about how this happens, and what you can do to protect your network.
Provided By FireEye
-
Unraveling Web Malware
Security researchers and IT administrators have recently witnessed a rapid rise in the use of Web-based blended threats-for example, dangerous (and potentially obfuscated) JavaScript and ActiveX code-to exploit client browsers and operating systems. The rise coincides with the increasing use of Web 2.0 technologies that allow for user-contributed content, syndicated...
Provided By FireEye