Industry Perspectives Blog

In Case You Missed It-FireEye Top Stories 10/9


1. FireEye Cyber Defense Security Summit: Next week, FireEye hosts the 2015 Cyber Defense Security Summit, formerly known as MIRcon. Held in Washington, D.C., the summit brings together 1,700 security professionals for 25 sessions of the best information related to the cyber security industry. Gen. Colin L. Powell (Ret.) will provide one of two keynote addresses. Click here to learn more and register.



2. A New Partnership: FireEye and F5 announced a joint partnership to deliver integrated security solutions. Enterprise IT departments need to support Cloud-based applications and mobile environments while maintaining network reliability and speed. The joint partnership between FireEye and F5 will provide technologies with advanced threat management platforms to accelerate application deployment, performance and security. 

3.  Kemoge Wants to Ad You: The latest malware FireEye discovered poses as a harmless app but roots itself on Android devices and floods the user with ads, even if the phone stays on the home screen. Users install these infected applications without realizing they’re installing compromised apps. Kemoge has infected more than 20 countries. FireEye advises users not to install an app that is not available from the official Google Play store.

4. Samsung Hack Didn’t Affect Mobile Payments: A breach of LoopPay, Samsung’s mobile payment system, apparently didn’t result in user’s payment information being released, according to the Wall Street Journal. The incident earlier this year involved three servers in the company’s internal network. Samsung Pay was not impacted, and the company says it was an isolated incident. Samsung purchased LoopPay, a U.S.-based start up, earlier this year.

5. Go Before the Board:  Julie Cullivan, FireEye SVP and CIO, published an article in on why security can’t rest solely on the shoulders of the CIO. Cullivan said that Boards need to understand cyber risk is not just a technical responsibility but an enterprise-wide concern. In the article, she posed several questions that decision-makers need to answer regarding security, including “how good is good enough” and “how secure do we need to be?”