What do you need to ensure you're building a security program for your organization that is adequate enough to thwart hackers? When it comes to industrial control systems, the answer may not be what you expect. You need to take into account the needs of both IT and ICS assets by building an enterprise program that offers comprehensive visibility into risks while addressing the needs of each specific environment.Read more...
Executive Perspectives Blog
Blog posts categorized under executive perspectives generally cover the latest news and trends in cyber threats and cyber security. Mindful of executive interests, they address broad technology issues as well as the costs and business impact of cyber security.
August 10, 2016 10:01 AM By Grady Summers
Cyber security means more than responding to an attack. It requires being proactive, as well as determining just how much security it needs based on its particular parameters. Find out what your company needs to know about securing the organization.
A conversation with Kevin Mandia – From the cyber trenches, to founding Mandiant and now CEO of FireEyeAugust 8, 2016 5:35 PM By Grady Summers | Business Of Security, Leadership
Listen to CEO Kevin Mandia discuss how he came to lead FireEye in this latest Eye on Security podcast.Read more...
July 21, 2016 10:00 AM By Grady Summers | Advanced Threat Trends
Banks and other financial institutions are favorite targets for threat actors intent on stealing data and money. A new whitepaper from FireEye will help these organizations better defend against these ongoing, and increasingly sophisticated, threats. This blog offers more information on the paper, as well as recommendations for better asset protection.
Next Generation of Incident Preparedness: Are You Prepared to Effectively Respond to Advanced Security Incidents?June 3, 2016 8:13 AM By FireEye | Leadership
Organizations need to evolve their security approach from a compliance-based, reactive program to a proactive, business risk- focused program with advanced threat protection to reduce the risk of compromise. Here's how they can do it.