FireEye

Displaying 1 - 10 of 56 results

  • Red Team Operations

    White Papers // May 2016 // provided by FireEye

    Learn in this data sheet how Mandiant’s Red Team Operations proactively identify and mitigate complex security vulnerabilities that can lead to critical data loss. Learn how to know whether your critical data is at risk and how easily it may be obtained by a malicious actor, and test your security ...

    Read more
  • The Rise of Red Team Operations

    Webcasts // May 2016 // provided by FireEye

    How strong is your cyber security? Join Chris Truncer, Senior Consultant at Mandiant, a FireEye company, as he provides an introduction to Mandiant Red Team Operations. Learn how Mandiant can achieve a realistic assessment of the effectiveness of your cyber security by emulating the attacker tools, tactics and practices used ...

    Watch Now
  • Webinar: A View from the front lines with M-Trends 2016

    White Papers // Apr 2016 // provided by FireEye

    M-Trends is the annual cyber security report created by Mandiant Services, a FireEye company. You are invited to a webinar, where Marshall Heilman, VP and Executive Director of Incident Response and Red Team Operations will take you through the 2016 report and provide insights from advanced attack investigations including trends, ...

    Watch Now
  • M-Trends 2016

    White Papers // Apr 2016 // provided by FireEye

    The M-Trends 2016 report provides trends, statistics and case studies to illustrate how advanced threat actors have evolved over the past year. The 2016 report includes details of: How cyber attackers are holding data for ransom, stealing personally identifiable information and destroying critical systems Why enterprise networking devices, such ...

    Download Now
  • The Uncomfortable Cyber Security Tradeoff

    White Papers // Mar 2016 // provided by FireEye

    Recent high-profile security breaches, underscore how destructive a breach can be to an organization's reputation and financial stability. Many of these headline-grabbing targeted attacks are based on monetary profit, political gain, or data theft, and are a result of an active, persistent pursuit with the ...

    Download Now
  • Protecting Your Data, Intellectual Property and Brand From Cyber Attacks

    White Papers // Mar 2016 // provided by FireEye

    Keeping up with the volume of network alerts and the new techniques that cyber attackers are constantly developing can be exhausting for security teams. Organizations spend a considerable amount of time and money on cyber security, but the attacks keep coming—and many of them breach networks. Although ...

    Download Now
  • Get a True Picture of the Threat Landscape

    White Papers // Mar 2016 // provided by FireEye

    M-Trends 2016 provides trends, statistics and case studies to illustrate how advanced threat actors have evolved over the past year. The annual report was compiled by consultants at Mandiant, a FireEye company, and is based on hundreds of Mandiant incident response investigations in more than 30 industry sectors. It offers ...

    Read more
  • Top 10 Security Predictions for 2016

    Webcasts // Mar 2016 // provided by FireEye

    2015 was filled with one-off incidents, but it also saw plenty of longer-term activity from advanced actors. With the attack surface and threat landscape constantly shifting and evolving, next year is bound to keep IT staffers, vulnerability seekers and security researchers hard at work. In 2016, we have our ...

    Register Now
  • Exercising the C-Suite: Gain IR Muscle

    Webcasts // Jan 2016 // provided by FireEye

    In this webinar, Mandiant Principal Consultant Matt Shaffer will examine how organizations involve their C-Suite in simulations and game activities to build awareness of best practices and common pitfalls. Join this webinar to learn how you can fully engage your C-suite and improve your organization’s security posture.

    View this now
  • Top 10 Security Predictions for 2016

    Webcasts // Jan 2016 // provided by FireEye

    It’s been a year of more-more cyber attacks in more industries. And health care has emerged as the target of the year, affecting the lives of millions of customers and employees. 2015 has also been the year of international cyber treaties to help curb attacks. What will the new ...

    View this now