The new threat landscape has changed. Cybercriminals and nation-states are aggressively pursuing valuable data assets, such as financial transaction information, product design blueprints, user credentials to sensitive systems, and other intellectual property. Simply put, the cyber offense has outpa...
Just how (in)effective are today’s defensein-
depth deployments? Unfortunately,
industry testing bodies offer little help
for organizations looking to assess their
defenses. Controlled laboratory settings
rely on samples of known threats and
assumptions about cyber attacks, which
may be out...
FireEye intelligence analysts frequently
observe two types of advanced threat actors
targeting companies involved in healthcare
services, pharmaceuticals production, and medical
A rash of recent high-profile data breaches
among well-known companies has drawn
attention to the critical role that corporate
directors play in cyber security. Boards are increasingly
involved in assessing the risk, improving the security
profile of the companies they advise, and managing the
This paper offers a better and more current framework to understand both the next-generation threat landscape of advanced malware and the five key design principles needed to eliminate the devil’s bargain implicit in today’s dated and highly ineffective rule-, signature- and list-based defenses.
Mobile devices have become critical in today’s digital workplace. But most organizations lack the security to ensure they, and the data they contain, are secure. Most security teams cannot fully account for—let alone monitor—the vast array of apps that have access to valuable corporate...