Seven Considerations for Achieving CJIS Compliance

The U.S. FBI’s Criminal Justice Information Services (CJIS) is now requiring strong passwords and advanced authentication across all systems, giving a deadline of September 30, 2014 to comply. If security...
0 comment

Hot Knives Through Butter Evading File Based Sandboxes

Prime numbers are a mathematician’s best friend. And file-based sandboxes are an IT security researcher’s best friend. Unfortunately, malware authors know this. Aware that researchers are using sandboxes...
0 comment

Exposing One of China’s Cyber Espionage Units

Since 2004, Mandiant has investigated computer security breaches at hundreds of organizations around the world. The majority of these security breaches are attributed to advanced threat actors referred...
0 comment

MTrends: Beyond the Breach

Drawing from hundreds of real-world incident response engagements by Mandiant, a FireEye Company, the 2014 M-Trends Threat Report reveals key insights, statistics and case studies illustrating how the...
0 comment

Cybersecurity’s Maginot Line: A Real-World Assessment of the Defense-in-Depth Model

This first-of-its-kind study examines data from more than 1,600 FireEye network and email appliances in real-world settings. The FireEye devices were part of more than 1,200 “proof-of-value” trials...
0 comment

FireEye Advanced Threat Report: 2013

The 2013 edition of the FireEye Advanced Threat Report analyses more than 40,000 advanced attacks across the globe to map out the latest trends in advanced persistent threat (APT) attacks. Leveraging...
0 comment

What You Don’t Know Can Hurt You

Organizations today are grappling with an increasingly complex cybersecurity environment. Attacks are coming faster and are more sophisticated, and there are heightened risks from greater information...
0 comment

Ponemon Security Survey

Threat Intelligence & Incident Response:  A Study of U.S. & EMEA Organizations, sponsored by AccessData, surveyed 1,083 CISOs and security technicians in the United States and EMEA about how...
0 comment

Perfect Forward Secrecy: The Next Step in Data Security

With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases. That’s why Symantec is continuing to innovate...
0 comment

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

The online world can be a scary place as the integration of the Internet into everyone’s lives has also brought with it an ever-increasing trend towards malicious activity. Learn how online businesses...
0 comment