FireEye

Displaying 11 - 20 of 61 results

  • M-Trends 2016

    White Papers · Apr 2016 · Provided By FireEye

    The M-Trends 2016 report provides trends, statistics and case studies to illustrate how advanced threat actors have evolved over the past year. The 2016 report includes details of: How cyber attackers are holding data for ransom, stealing personally identifiable information and destroying critical systems Why enterprise networking devices, such...

    Download Now
  • Get a True Picture of the Threat Landscape

    White Papers · Apr 2016 · Provided By FireEye

    M-Trends 2016 provides trends, statistics and case studies to illustrate how advanced threat actors have evolved over the past year. The annual report was compiled by consultants at Mandiant, a FireEye company, and is based on hundreds of Mandiant incident response investigations in more than 30 industry sectors. It offers...

    Read More
  • Webinar: A View from the front lines with M-Trends 2016

    White Papers · Apr 2016 · Provided By FireEye

    M-Trends is the annual cyber security report created by Mandiant Services, a FireEye company. You are invited to a webinar, where Marshall Heilman, VP and Executive Director of Incident Response and Red Team Operations will take you through the 2016 report and provide insights from advanced attack investigations including trends,...

    Watch Now
  • The Uncomfortable Cyber Security Tradeoff

    White Papers · Mar 2016 · Provided By FireEye

    Recent high-profile security breaches, underscore how destructive a breach can be to an organization's reputation and financial stability. Many of these headline-grabbing targeted attacks are based on monetary profit, political gain, or data theft, and are a result of an active, persistent pursuit with the...

    Download Now
  • Protecting Your Data, Intellectual Property and Brand From Cyber Attacks

    White Papers · Mar 2016 · Provided By FireEye

    Keeping up with the volume of network alerts and the new techniques that cyber attackers are constantly developing can be exhausting for security teams. Organizations spend a considerable amount of time and money on cyber security, but the attacks keep coming—and many of them breach networks. Although...

    Download Now
  • Top 10 Security Predictions for 2016

    Webcasts · Mar 2016 · Provided By FireEye

    2015 was filled with one-off incidents, but it also saw plenty of longer-term activity from advanced actors. With the attack surface and threat landscape constantly shifting and evolving, next year is bound to keep IT staffers, vulnerability seekers and security researchers hard at work. In 2016, we have our...

    Register Now
  • Exercising the C-Suite: Gain IR Muscle

    Webcasts · Jan 2016 · Provided By FireEye

    In this webinar, Mandiant Principal Consultant Matt Shaffer will examine how organizations involve their C-Suite in simulations and game activities to build awareness of best practices and common pitfalls. Join this webinar to learn how you can fully engage your C-suite and improve your organization’s security posture.

    View This Now
  • Top 10 Security Predictions for 2016

    Webcasts · Jan 2016 · Provided By FireEye

    It’s been a year of more-more cyber attacks in more industries. And health care has emerged as the target of the year, affecting the lives of millions of customers and employees. 2015 has also been the year of international cyber treaties to help curb attacks. What will the new...

    View This Now
  • Enemies in Our Midst: The Benefits of Compromise Assessments

    White Papers · Jan 2016 · Provided By FireEye

    It’s not a question of if your organization will be breached. It’s a question of when. Most attackers remain active in environments for a significant amount of time before being discovered. And only a small percentage of organizations discover the presence of advanced attackers themselves—most need to be informed by...

    Find Out More
  • Webinar: The Move to Mobile-Android and iOS Attacks

    Webcasts · Jan 2016 · Provided By FireEye

    Cyber attacks that target mobile apps, such as Masque attacks, are on the rise—so much so that mobile is now the fastest growing threat vector to the enterprise. Get insights into a threat group that exploit using the iOS Masque attack, and be vigilant against cyber attacks on mobile...

    Watch Now