RPT M-Trends 2016

Mandiant’s annual threat report reveals key insights, statistics and case studies illustrating how the tools and tactics of advanced persistent threat (APT) actors have evolved over the last year. The report, compiled from hundreds of Mandiant incident response investigations in more than 30 industry sectors, also includes approaches that organizations can take to improve the way they detect, respond to, and contain advanced attacks.
Get Whitepaper

WP Are You Ready to Respond

In spite of the best efforts of the cyber security industry to protect computer networks, breaches still happen, causing millions of dollars in damage, tainting the reputation of corporations, and causing end users to lose confidence in the security of their personal information. Given that new reality, it’s not enough for organizations to try to protect their networks from a breach, but to have an effective response plan in place for when a breach occurs anyway.

Today, companies need to conduct a comprehensive response readiness assessment that lays out what steps to take in the event of a breach in order to minimize the damage and recover from the intrusion as quickly as possible.
Get Whitepaper

Behind the Syrian Conflict’s Digital Front Lines

Physical conflicts increasingly have a cyber element to them. This report highlights how Syrian opposition forces fell victim to a well-executed hacking operation targeting secret communications and plans.

FireEye researchers uncovered these stolen documents as part of our ongoing threat research. Between at least November 2013 and January 2014, the hackers stole a cache of critical documents and Skype conversations revealing the Syrian opposition’s strategy, tactical battle plans, supply needs, and troves of personal information and chat sessions belonging to the men fighting against Syrian President Bashar al-Assad’s forces. While we do not know who conducted this hacking operation, if this data was acquired by Assad’s forces or their allies it could confer a distinct battlefield advantage.
Get Whitepaper

APT 30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION

Having some of the world’s most active economies, Asia Pacific countries are more likely to be a target of targeted attacks than the rest of the world. In “Operation Quantum Entanglement”, “Pacific Ring of Fire: PlugX / Kaba” and other FireEye reports, we have highlighted how Northeast Asian countries have been at the centre of advanced attacks. Today, we release a new report “APT 30 and the Mechanics of a Long-Running Cyber Espionage Operation,” which documents about a threat group, APT 30, who has consistently targeted Southeast Asia and India over the past decade.
Get Whitepaper

WP How Secure Do You Want to Be

Protecting against advanced cyber-attacks requires, among other things, that you meet the same level of sophistication as your attackers. Unfortunately, most current security technologies fail to meet that bar, resulting in organizations being breached when they thought they were protected.

A resulting breach can be devastating, leading most organizations to re-evaluate their security program. Critically evaluating your security program in its entirety and looking for the areas it can be improved is a daunting task.
Get Whitepaper

WP Are You Ready to Respond

"In spite of the best efforts of the cyber security industry to protect computer networks, breaches still happen, causing millions of dollars in damage, tainting the reputation of corporations, and causing end users to lose confidence in the security of their personal information. Given that new reality, it’s not enough for organizations to try to protect their networks from a breach, but to have an effective response plan in place for when a breach occurs anyway.

Today, companies need to conduct a comprehensive response readiness assessment that lays out what steps to take in the event of a breach in order to minimize the damage and recover from the intrusion as quickly as possible."
Get Whitepaper

IBM X-Force Threat Intelligence Quarterly – 4Q 2015

2015 has been a challenging year as insider threats, malware, and stealthy and mutating attacks have affected the threat landscape. Read the latest security research from IBM X-Force to learn:
  • How low-level attacks can mask stealthier infiltrations
  • The benefits of regularly maintained security procedures and response plans
  • When patterns of irregularities can be the first indicators of compromise

View IBM's privacy policy here

Get Whitepaper

WP Enemies in Our Midst

It’s not a question of if your organization will be breached. It’s a question of when.

Most attackers remain active in environments for a significant amount of time before being discovered. And only a small percentage of organizations discover the presence of advanced attackers themselves—most need to be informed by law enforcement or a proactive third-party security firm. By then, an attacker could do a great deal of damage.

A compromise assessment answers the all-important question: Have you been breached?
Get Whitepaper

WP Uncomfortable Trade Off

Recent high-profile security breaches, underscore how destructive a breach can be to an organization's reputation and financial stability.
Many of these headline-grabbing targeted attacks are based on monetary profit, political gain, or data theft, and are a result of an active, persistent pursuit with the intent to compromise the target’s infrastructure.
When customer data is stolen, the damage to an organization can be swift – and costly. With awareness of cyber security risks at all-time highs, investments are pouring into security technologies.
But how do you know if you are investing in the right set of security tools and threat intelligence?
Get Whitepaper

WP Protecting Your Data

Today's security defenses are failing because, in the battle against cybercrime, security teams are using an outdated arsenal. They rely too heavily on legacy platforms that leverage technology dependent upon signatures—and while these platforms may be good at blocking basic malware that is known and documented, they stand little chance against today's sophisticated, dynamic cyber attacks that occur across multiple vectors and stages.

In this guide for CIOs, CFOs, and CISOs, FireEye provides insight into the cyber security problem facing enterprises and government agencies today.
Get Whitepaper

WP 9 Steps

Transform that vast and noisy queue of mostly false alerts into a small collection of actionable narratives by following FireEye's "Nine Steps to Eliminate Alert Fatigue".
Get Whitepaper

Security Analytics: A Required Escalation in Cyber Defense

In this white paper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined.

This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Get Whitepaper

Mythbusting the Beliefs of DDoS Protection

Today’s DDoS attacks are an easy way to interrupt businesses. From holding a website hostage for a ransom, to blocking access to an application to make a political statement, or simply deflecting attention while other threat vectors steal information, DDoS is a growing concern for enterprises. Yet even in today’s dynamic threat landscape, many enterprises still hold the belief that a dedicated DDoS protection solution is not important when their existing security solution may protect them 80 percent of the time. Others believe that what they adopted two years ago—let alone five years ago—still works today. In these instances, enterprises are gambling with their network.

It’s time to debunk some outmoded myths. There are five common mistakes that enterprises make when addressing DDoS. This white paper will shed some light on these failed practices, and provide insight into why they do not work.
Get Whitepaper