Category: FireEye
Improve Security Effectiveness and Efficiency by Validating Tools
Public-sector institutions are at high risk from a variety of threats, everything from nation state reconnaissance to data theft and ransomware. In fact, our latest M-Trends report revealed that government […]Gaining Visibility and Threat Detection in Cloud Content With Box and FireEye
Businesses share content internally and externally with suppliers, customers and others in a variety of ways. Technologies make it faster for businesses and employees to operate, especially in remote settings. […]FLARE IDA Pro Script Series: MSDN Annotations Plugin for Malware Analysis
The FireEye Labs Advanced Reverse Engineering (FLARE) Team continues to share knowledge and tools with the community. We started this blog series with a script for Automatic Recovery of Constructed […]Intelligence-Led Threat Protection for SaaS-Mobile Workforce — FireEye Detection With CipherCloud
When organizations turn to cloud apps to support the remote workforce and maintain business continuity, bad actors will follow. Employees working from home can expect any kind of attack, including […]FireEye Virtual Summit: Empower, Evolve and Defend
In today’s rapidly changing environment as digital attack surfaces are increasing, FireEye is proud to serve its mission to relentlessly protect our customers, world and society. Cyber attackers never rest […]Security Without Barriers, Part Two: Planning for Cyber Resilience
The network perimeter was a key component for defense-in-depth cyber security strategies, separating the internal “trusted” environment from the external “untrusted” world. For many organizations, recent world events have accelerated […]Are You Maximizing Your CTI Program? Here Are Five Ways to Know
Measuring the value of a cyber threat intelligence (CTI) capability and communicating that to executives and colleagues can be tricky. If an organization has a CTI program and isn’t experiencing […]FireEye Success Story: Solutions and Strategies for Elections Part Four — Post-Election Improvement
Never has Benjamin Franklin’s words been more relevant. One of the greatest minds of the Founding Fathers of the United States was not only a great inventor, he was a […]Stay Secure While Using Collaboration Platforms
COVID-19 has brought on a rapid shift to remote work. Many organizations were unprepared, so they quickly turned to collaboration platforms that could help employees get back to work. But […]Continuous Security Validation Is Critical for the Evolution of a Developed Security Program — but How Is It Most Effective?
For years we have seen a disturbing phenomenon that continues to put enterprises to the test—no matter how much money organizations spend on bolstering cyber security defenses, attackers keep finding […]Load More