Getting Started With a Zero Trust Approach to Network Security

The continued high frequency of successful cyber attacks against today’s enterprises has made it abundantly clear that traditional, perimeter-centric security strategies are no longer effective. With...
0 comment

Evaluator’s Guide: Single Sign-On Vendor Selection

The right single sign-on (SSO) solution will allow your users to securely log on once to access all their applications. This protects information, reduces password-related help desk calls, and improves...
0 comment

Seven Considerations for Achieving CJIS Compliance

The U.S. FBI’s Criminal Justice Information Services (CJIS) is now requiring strong passwords and advanced authentication across all systems, giving a deadline of September 30, 2014 to comply. If security...
0 comment

Hot Knives Through Butter Evading File Based Sandboxes

Prime numbers are a mathematician’s best friend. And file-based sandboxes are an IT security researcher’s best friend. Unfortunately, malware authors know this. Aware that researchers are using sandboxes...
0 comment

Exposing One of China’s Cyber Espionage Units

Since 2004, Mandiant has investigated computer security breaches at hundreds of organizations around the world. The majority of these security breaches are attributed to advanced threat actors referred...
0 comment

MTrends: Beyond the Breach

Drawing from hundreds of real-world incident response engagements by Mandiant, a FireEye Company, the 2014 M-Trends Threat Report reveals key insights, statistics and case studies illustrating how the...
0 comment

Cybersecurity’s Maginot Line: A Real-World Assessment of the Defense-in-Depth Model

This first-of-its-kind study examines data from more than 1,600 FireEye network and email appliances in real-world settings. The FireEye devices were part of more than 1,200 “proof-of-value” trials...
0 comment

FireEye Advanced Threat Report: 2013

The 2013 edition of the FireEye Advanced Threat Report analyses more than 40,000 advanced attacks across the globe to map out the latest trends in advanced persistent threat (APT) attacks. Leveraging...
0 comment

What You Don’t Know Can Hurt You

Organizations today are grappling with an increasingly complex cybersecurity environment. Attacks are coming faster and are more sophisticated, and there are heightened risks from greater information...
0 comment

Ponemon Security Survey

Threat Intelligence & Incident Response:  A Study of U.S. & EMEA Organizations, sponsored by AccessData, surveyed 1,083 CISOs and security technicians in the United States and EMEA about how...
0 comment