FireEye

Displaying 1-10 of 10 results

  • Videos // Aug 2013

    Webinar: Advanced Malware And APT Attacks

    Watch this webinar to learn: * What are the traits of Advanced Persistent Threats (APT)? * What are the infection vectors? * What are the advanced techniques? * Who are the threat actors?

    Provided By FireEye

  • Videos // Aug 2013

    Webinar: How Client-side Attacks Evade Traditional Security Controls

    Hosted by Ben Wilson, Senior Systems Engineer, CISSP, GXPN Bypassing traditional security controls is becoming a commodity. Hear more and watch a demo about how this happens, and what you can do to protect your network.

    Provided By FireEye

  • White Papers // Jul 2013

    Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks - A Guide for CIOs, CFOs, and CISOs

    Enterprises and government agencies are under virtually constant attack today. Significant breaches at RSA, Global Payments, ADP, Symantec, International Monetary Fund, and a number of other organizations have made headlines. 95% of organizations are routinely compromised, with the theft of intellectual property, customer records, and other sensitive data increasingly common.

    ...

    Provided By FireEye

  • White Papers // May 2013

    EMA: Closing Critical IT Security Gaps for More Effective Defense

    An ENTERPRISE MANAGEMENT ASSOCIATES (EMA) White Paper.

    In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate. Organizations have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In...

    Provided By FireEye

  • White Papers // Mar 2013

    Cybersecurity Strategies for Small to Medium-Sized Businesses

    Small to medium-sized businesses are essential to the global economy. They contribute $3.8 trillion annually to the U.S. private-sector GDP (Gross Domestic Product) alone, which ranks them as the equivalent of the world's fourth-largest country. And many of the challenges faced by today's small to medium-sized businesses are no different...

    Provided By FireEye

  • eBooks // Mar 2013

    eBook: Definitive Guide to Next-Generation Threat Protection

    Winning the War Against the New Breed of Cyber Attacks. Despite the over $20 billion invested in IT security technology last year, countless enterprises and government agencies have fallen victim to cyber attacks of incredible sophistication and complexity. This all points to the singular resounding reality: the next generation of...

    Provided By FireEye

  • White Papers // Oct 2012

    Advanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks

    Traditional defenses are increasingly becoming policy enforcement points rather than robust defenses against cyber intrusions. To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive, and real-time. Through continuous analysis of suspicious code throughout the attack lifecycle and blocking of malware communications across...

    Provided By FireEye

  • Webcasts // Oct 2012

    Spear Phishing: Avoid Becoming a Trophy Phish

    Unique phishing attacks surge worldwide according to the Anti-Phishing Working Group. Advanced targeted attacks, like spear phishing, are fast becoming the norm. Spear phishing has especially become a successful tactic that hackers use to exploit networks and trigger an attack that can lead to catastrophic financial, operational, and reputation risks....

    Provided By FireEye

  • White Papers // Oct 2012

    Spear Phishing Attacks: Why They are Successful and How to Stop Them

    Spear phishing is on the rise - because it works. Cyber criminals have moved from broad, scattershot attacks to advanced targeted attacks like spear phishing. This has proven to be highly effective with serious consequences to victim organizations, requiring enterprises to find a way to more effectively combat evolving threats....

    Provided By FireEye

  • White Papers // Sep 2008

    Unraveling Web Malware

    Security researchers and IT administrators have recently witnessed a rapid rise in the use of Web-based blended threats-for example, dangerous (and potentially obfuscated) JavaScript and ActiveX code-to exploit client browsers and operating systems. The rise coincides with the increasing use of Web 2.0 technologies that allow for user-contributed content, syndicated...

    Provided By FireEye

  • Webcasts // Oct 2012

    Spear Phishing: Avoid Becoming a Trophy Phish

    Unique phishing attacks surge worldwide according to the Anti-Phishing Working Group. Advanced targeted attacks, like spear phishing, are fast becoming the norm. Spear phishing has especially become a successful tactic that hackers use to exploit networks and trigger an attack that can lead to catastrophic financial, operational, and reputation risks....

    Provided By FireEye

  • White Papers // Oct 2012

    Spear Phishing Attacks: Why They are Successful and How to Stop Them

    Spear phishing is on the rise - because it works. Cyber criminals have moved from broad, scattershot attacks to advanced targeted attacks like spear phishing. This has proven to be highly effective with serious consequences to victim organizations, requiring enterprises to find a way to more effectively combat evolving threats....

    Provided By FireEye

  • White Papers // Oct 2012

    Advanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks

    Traditional defenses are increasingly becoming policy enforcement points rather than robust defenses against cyber intrusions. To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive, and real-time. Through continuous analysis of suspicious code throughout the attack lifecycle and blocking of malware communications across...

    Provided By FireEye

  • eBooks // Mar 2013

    eBook: Definitive Guide to Next-Generation Threat Protection

    Winning the War Against the New Breed of Cyber Attacks. Despite the over $20 billion invested in IT security technology last year, countless enterprises and government agencies have fallen victim to cyber attacks of incredible sophistication and complexity. This all points to the singular resounding reality: the next generation of...

    Provided By FireEye

  • White Papers // May 2013

    EMA: Closing Critical IT Security Gaps for More Effective Defense

    An ENTERPRISE MANAGEMENT ASSOCIATES (EMA) White Paper.

    In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate. Organizations have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In...

    Provided By FireEye

  • White Papers // Mar 2013

    Cybersecurity Strategies for Small to Medium-Sized Businesses

    Small to medium-sized businesses are essential to the global economy. They contribute $3.8 trillion annually to the U.S. private-sector GDP (Gross Domestic Product) alone, which ranks them as the equivalent of the world's fourth-largest country. And many of the challenges faced by today's small to medium-sized businesses are no different...

    Provided By FireEye

  • White Papers // Jul 2013

    Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks - A Guide for CIOs, CFOs, and CISOs

    Enterprises and government agencies are under virtually constant attack today. Significant breaches at RSA, Global Payments, ADP, Symantec, International Monetary Fund, and a number of other organizations have made headlines. 95% of organizations are routinely compromised, with the theft of intellectual property, customer records, and other sensitive data increasingly common.

    ...

    Provided By FireEye

  • Videos // Aug 2013

    Webinar: Advanced Malware And APT Attacks

    Watch this webinar to learn: * What are the traits of Advanced Persistent Threats (APT)? * What are the infection vectors? * What are the advanced techniques? * Who are the threat actors?

    Provided By FireEye

  • Videos // Aug 2013

    Webinar: How Client-side Attacks Evade Traditional Security Controls

    Hosted by Ben Wilson, Senior Systems Engineer, CISSP, GXPN Bypassing traditional security controls is becoming a commodity. Hear more and watch a demo about how this happens, and what you can do to protect your network.

    Provided By FireEye

  • White Papers // Sep 2008

    Unraveling Web Malware

    Security researchers and IT administrators have recently witnessed a rapid rise in the use of Web-based blended threats-for example, dangerous (and potentially obfuscated) JavaScript and ActiveX code-to exploit client browsers and operating systems. The rise coincides with the increasing use of Web 2.0 technologies that allow for user-contributed content, syndicated...

    Provided By FireEye