Part one of our three-part series on victim notifications introduced the concept of victim notifications and the basics of preparing for a notification. The second post of the series provided details on how companies can prepare for, validate, and respond to victim notifications. This post concludes the three-part series with a brief discussion around issues that organizations that provide victim notifications face and recommendations for how they can provide notifications in a practical and effective manner.Read more...
Entries filed under 'APT'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
October 1, 2012 6:35 PM By Carlos Carrillo
September 19, 2012 3:31 PM By Kevin Albano
Given the dedication and persistence of attackers, no one is immune from network security breaches. More often than not, organizations learn of a security breach from an external source. This post explores victim notifications and factors to consider before and after receipt of a notification.Read more...
August 27, 2012 3:51 PM By Richard Bejtlich
August 21, 2012 5:47 PM By John Bradshaw
I remember (way) back in 1989 when I had just started my career in IT, HP came out with a slogan, "We never stop asking, 'What if....'" What I've come to learn as I moved into the realm of responding to security intrusions is that you should never stop asking, "Now what??"Read more...