FireEye

Displaying 1-20 of 20 results

  • White Papers // Dec 2013

    Securing Cloud-Based Email: A Guide for Government Agencies

    Today, email-based threats represent significant and persistent risks for government agencies, and those dangers are only exacerbated by the move to cloud delivery models. This paper shows how government agencies can capitalize on the benefits of the cloud, while addressing their critical security gaps. The paper reveals how by inspecting...

    Provided By FireEye

  • White Papers // Dec 2013

    Debunking the Myth of Sandbox Security

    Aware that their backward-facing defenses fall short, several IT security vendors are touting their sandbox products. But rather than adopting a truly fresh approach, most are merely grafting a sandbox onto their legacy strategies, which routinely fail to catch these attacks. While sandboxing advances the signature-based approach of the past,...

    Provided By FireEye

  • White Papers // Nov 2013

    Less Secure Than You Think

    This white paper examines the changing threat landscape, how the nature of security threats has evolved, and the potential financial impact across vertical markets and organizations of all sizes. This paper will explain why advanced targeted attacks have been extremely effective at breaking through traditional network security and enabling the...

    Provided By FireEye

  • White Papers // Nov 2013

    Supply Chain Analysis: From Quartermaster to SunshopFireEye Labs

    Many seemingly unrelated cyber attacks may, in fact, be part of a broader offensive fueled by a shared development and logistics infrastructure - a finding that suggests some targets are facing a more organized menace than they realize. This report examines 11 advanced persistent threat (APT) campaigns targeting a...

    Provided By FireEye

  • Case Studies // Nov 2013

    SANS WhatWorks in Detecting and Blocking Advanced Threats

    A Real Case Study at a Large Research Organization In an interview with SANS Director of Emerging Technologies John Pescatore, a veteran cybersecurity practitioner discusses how his team address the challenge of balancing high risk activities with effective cybersecurity operations. Read the interview now for insight into how your organization...

    Provided By FireEye

  • White Papers // Nov 2013

    Hot Knives Through Butter: Evading File-based Sandboxes

    Sandboxes provide isolated, virtual environments that monitor the actual behavior of files as they execute. In theory, this setup enables security professionals to spot malicious code that evades traditional signature-based defenses. But sandboxes are only as good as the analysis that surrounds them. By themselves, sandboxes can only monitor...

    Provided By FireEye

  • White Papers // Nov 2013

    Poison Ivy: Assessing Damage and Extracting Intelligence

    This report spotlights Poison Ivy (PIVY), a Remote Access Tool (RAT) that remains popular and effective a full eight years after its release, despite its age and familiarity in IT security circles. Poison Ivy has been used in several high-profile malware campaigns, most notoriously, the 2011 compromise of RSA SecurID...

    Provided By FireEye

  • White Papers // Nov 2013

    The New Breed of Email-based Cyber Attacks - and What it Takes to Defend Against Them

    As security teams look to shore up their organization's vulnerabilities, email represents a critical attack vector to address. Through highly targeted email attacks known as spear phishing, attackers are consistently compromising the security defenses in place, proving the need for a next-generation threat protection platform. FireEye research indicates that,...

    Provided By FireEye

  • White Papers // Nov 2013

    World War C: Combatting Nation-State Cyber Attacks

    Cyberspace is now a full-blown war zone as global governments race to assert their supremacy on a new shadowy frontline. In this new war, battles are fought with bits instead of bullets, malware instead of militias, and botnets instead of bombs. And the list of casualties - which already...

    Provided By FireEye

  • White Papers // Nov 2013

    Seven Clues To Identifying Who Is Behind Advanced Cyber Attacks

    In today's cyber threat landscape, identifying your enemy is a crucial piece of any defense plan. Finding out who your attackers are, how they work, and what they want is critical to protecting your data and intellectual property. Fortunately, breached computer systems, like any crime scene, contain a trail...

    Provided By FireEye

  • White Papers // Nov 2013

    The Advanced Cyber Attack Landscape

    Recent reports have pinpointed China as a key driver behind cyber attacks designed to steal intellectual property and other sensitive information. But advanced cyber attacks are not confined to just one nation. Rather, cyber attacks are a widespread global activity. During the course of 2012, FireEye monitored more than...

    Provided By FireEye

  • Videos // Aug 2013

    Webinar: Advanced Malware And APT Attacks

    Watch this webinar to learn: * What are the traits of Advanced Persistent Threats (APT)? * What are the infection vectors? * What are the advanced techniques? * Who are the threat actors?

    Provided By FireEye

  • Videos // Aug 2013

    Webinar: How Client-side Attacks Evade Traditional Security Controls

    Hosted by Ben Wilson, Senior Systems Engineer, CISSP, GXPN Bypassing traditional security controls is becoming a commodity. Hear more and watch a demo about how this happens, and what you can do to protect your network.

    Provided By FireEye

  • White Papers // Jul 2013

    Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks - A Guide for CIOs, CFOs, and CISOs

    Enterprises and government agencies are under virtually constant attack today. Significant breaches at RSA, Global Payments, ADP, Symantec, International Monetary Fund, and a number of other organizations have made headlines. 95% of organizations are routinely compromised, with the theft of intellectual property, customer records, and other sensitive data increasingly common....

    Provided By FireEye

  • White Papers // May 2013

    EMA: Closing Critical IT Security Gaps for More Effective Defense

    An ENTERPRISE MANAGEMENT ASSOCIATES (EMA) White Paper. In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate. Organizations have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In...

    Provided By FireEye

  • White Papers // Mar 2013

    Cybersecurity Strategies for Small to Medium-Sized Businesses

    Small to medium-sized businesses are essential to the global economy. They contribute $3.8 trillion annually to the U.S. private-sector GDP (Gross Domestic Product) alone, which ranks them as the equivalent of the world's fourth-largest country. And many of the challenges faced by today's small to medium-sized businesses are no different...

    Provided By FireEye

  • eBooks // Mar 2013

    eBook: Definitive Guide to Next-Generation Threat Protection

    Winning the War Against the New Breed of Cyber Attacks. Despite the over $20 billion invested in IT security technology last year, countless enterprises and government agencies have fallen victim to cyber attacks of incredible sophistication and complexity. This all points to the singular resounding reality: the next generation of...

    Provided By FireEye

  • White Papers // Oct 2012

    Advanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks (2013 Report)

    Traditional defenses are increasingly becoming policy enforcement points rather than robust defenses against cyber intrusions. To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive, and real-time. Through continuous analysis of suspicious code throughout the attack lifecycle and blocking of malware communications across...

    Provided By FireEye

  • Webcasts // Oct 2012

    Spear Phishing: Avoid Becoming a Trophy Phish

    Unique phishing attacks surge worldwide according to the Anti-Phishing Working Group. Advanced targeted attacks, like spear phishing, are fast becoming the norm. Spear phishing has especially become a successful tactic that hackers use to exploit networks and trigger an attack that can lead to catastrophic financial, operational, and reputation risks....

    Provided By FireEye

  • White Papers // Oct 2012

    Spear Phishing Attacks: Why They are Successful and How to Stop Them

    Spear phishing is on the rise - because it works. Cyber criminals have moved from broad, scattershot attacks to advanced targeted attacks like spear phishing. This has proven to be highly effective with serious consequences to victim organizations, requiring enterprises to find a way to more effectively combat evolving threats....

    Provided By FireEye

  • White Papers // Nov 2013

    Hot Knives Through Butter: Evading File-based Sandboxes

    Sandboxes provide isolated, virtual environments that monitor the actual behavior of files as they execute. In theory, this setup enables security professionals to spot malicious code that evades traditional signature-based defenses. But sandboxes are only as good as the analysis that surrounds them. By themselves, sandboxes can only monitor...

    Provided By FireEye

  • White Papers // Nov 2013

    Poison Ivy: Assessing Damage and Extracting Intelligence

    This report spotlights Poison Ivy (PIVY), a Remote Access Tool (RAT) that remains popular and effective a full eight years after its release, despite its age and familiarity in IT security circles. Poison Ivy has been used in several high-profile malware campaigns, most notoriously, the 2011 compromise of RSA SecurID...

    Provided By FireEye

  • White Papers // Nov 2013

    The New Breed of Email-based Cyber Attacks - and What it Takes to Defend Against Them

    As security teams look to shore up their organization's vulnerabilities, email represents a critical attack vector to address. Through highly targeted email attacks known as spear phishing, attackers are consistently compromising the security defenses in place, proving the need for a next-generation threat protection platform. FireEye research indicates that,...

    Provided By FireEye

  • White Papers // Nov 2013

    World War C: Combatting Nation-State Cyber Attacks

    Cyberspace is now a full-blown war zone as global governments race to assert their supremacy on a new shadowy frontline. In this new war, battles are fought with bits instead of bullets, malware instead of militias, and botnets instead of bombs. And the list of casualties - which already...

    Provided By FireEye

  • Case Studies // Nov 2013

    SANS WhatWorks in Detecting and Blocking Advanced Threats

    A Real Case Study at a Large Research Organization In an interview with SANS Director of Emerging Technologies John Pescatore, a veteran cybersecurity practitioner discusses how his team address the challenge of balancing high risk activities with effective cybersecurity operations. Read the interview now for insight into how your organization...

    Provided By FireEye

  • White Papers // Nov 2013

    Less Secure Than You Think

    This white paper examines the changing threat landscape, how the nature of security threats has evolved, and the potential financial impact across vertical markets and organizations of all sizes. This paper will explain why advanced targeted attacks have been extremely effective at breaking through traditional network security and enabling the...

    Provided By FireEye

  • White Papers // Nov 2013

    Supply Chain Analysis: From Quartermaster to SunshopFireEye Labs

    Many seemingly unrelated cyber attacks may, in fact, be part of a broader offensive fueled by a shared development and logistics infrastructure - a finding that suggests some targets are facing a more organized menace than they realize. This report examines 11 advanced persistent threat (APT) campaigns targeting a...

    Provided By FireEye

  • White Papers // Dec 2013

    Debunking the Myth of Sandbox Security

    Aware that their backward-facing defenses fall short, several IT security vendors are touting their sandbox products. But rather than adopting a truly fresh approach, most are merely grafting a sandbox onto their legacy strategies, which routinely fail to catch these attacks. While sandboxing advances the signature-based approach of the past,...

    Provided By FireEye

  • White Papers // Dec 2013

    Securing Cloud-Based Email: A Guide for Government Agencies

    Today, email-based threats represent significant and persistent risks for government agencies, and those dangers are only exacerbated by the move to cloud delivery models. This paper shows how government agencies can capitalize on the benefits of the cloud, while addressing their critical security gaps. The paper reveals how by inspecting...

    Provided By FireEye

  • Webcasts // Oct 2012

    Spear Phishing: Avoid Becoming a Trophy Phish

    Unique phishing attacks surge worldwide according to the Anti-Phishing Working Group. Advanced targeted attacks, like spear phishing, are fast becoming the norm. Spear phishing has especially become a successful tactic that hackers use to exploit networks and trigger an attack that can lead to catastrophic financial, operational, and reputation risks....

    Provided By FireEye

  • White Papers // Oct 2012

    Spear Phishing Attacks: Why They are Successful and How to Stop Them

    Spear phishing is on the rise - because it works. Cyber criminals have moved from broad, scattershot attacks to advanced targeted attacks like spear phishing. This has proven to be highly effective with serious consequences to victim organizations, requiring enterprises to find a way to more effectively combat evolving threats....

    Provided By FireEye

  • White Papers // Oct 2012

    Advanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks (2013 Report)

    Traditional defenses are increasingly becoming policy enforcement points rather than robust defenses against cyber intrusions. To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive, and real-time. Through continuous analysis of suspicious code throughout the attack lifecycle and blocking of malware communications across...

    Provided By FireEye

  • eBooks // Mar 2013

    eBook: Definitive Guide to Next-Generation Threat Protection

    Winning the War Against the New Breed of Cyber Attacks. Despite the over $20 billion invested in IT security technology last year, countless enterprises and government agencies have fallen victim to cyber attacks of incredible sophistication and complexity. This all points to the singular resounding reality: the next generation of...

    Provided By FireEye

  • White Papers // May 2013

    EMA: Closing Critical IT Security Gaps for More Effective Defense

    An ENTERPRISE MANAGEMENT ASSOCIATES (EMA) White Paper. In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate. Organizations have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In...

    Provided By FireEye

  • White Papers // Mar 2013

    Cybersecurity Strategies for Small to Medium-Sized Businesses

    Small to medium-sized businesses are essential to the global economy. They contribute $3.8 trillion annually to the U.S. private-sector GDP (Gross Domestic Product) alone, which ranks them as the equivalent of the world's fourth-largest country. And many of the challenges faced by today's small to medium-sized businesses are no different...

    Provided By FireEye

  • White Papers // Jul 2013

    Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks - A Guide for CIOs, CFOs, and CISOs

    Enterprises and government agencies are under virtually constant attack today. Significant breaches at RSA, Global Payments, ADP, Symantec, International Monetary Fund, and a number of other organizations have made headlines. 95% of organizations are routinely compromised, with the theft of intellectual property, customer records, and other sensitive data increasingly common....

    Provided By FireEye

  • Videos // Aug 2013

    Webinar: Advanced Malware And APT Attacks

    Watch this webinar to learn: * What are the traits of Advanced Persistent Threats (APT)? * What are the infection vectors? * What are the advanced techniques? * Who are the threat actors?

    Provided By FireEye

  • Videos // Aug 2013

    Webinar: How Client-side Attacks Evade Traditional Security Controls

    Hosted by Ben Wilson, Senior Systems Engineer, CISSP, GXPN Bypassing traditional security controls is becoming a commodity. Hear more and watch a demo about how this happens, and what you can do to protect your network.

    Provided By FireEye

  • White Papers // Nov 2013

    The Advanced Cyber Attack Landscape

    Recent reports have pinpointed China as a key driver behind cyber attacks designed to steal intellectual property and other sensitive information. But advanced cyber attacks are not confined to just one nation. Rather, cyber attacks are a widespread global activity. During the course of 2012, FireEye monitored more than...

    Provided By FireEye

  • White Papers // Nov 2013

    Seven Clues To Identifying Who Is Behind Advanced Cyber Attacks

    In today's cyber threat landscape, identifying your enemy is a crucial piece of any defense plan. Finding out who your attackers are, how they work, and what they want is critical to protecting your data and intellectual property. Fortunately, breached computer systems, like any crime scene, contain a trail...

    Provided By FireEye