Part one of our three-part series on victim notifications introduced the concept of victim notifications and the basics of preparing for a notification. The second post of the series provided details on how companies can prepare for, validate, and respond to victim notifications. This post concludes the three-part series with a brief discussion around issues that organizations that provide victim notifications face and recommendations for how they can provide notifications in a practical and effective manner.Read more...
Entries filed under 'Cybersecurity'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
October 4, 2012 6:25 PM By Helena Brito
October 1, 2012 6:35 PM By Carlos Carrillo
September 24, 2012 3:50 PM By Richard Bejtlich
Mandiant will host its third annual MIRcon on October 17th and 18th in Washington, DC. I attended the previous two MIRcon conferences, first as Director of Incident Response for my previous employer, and last year as Mandiant's Chief Security Officer. Last year we decided to host both a technical and management track during the two day event. I thoroughly enjoyed working with speakers for the management track portion of the conference and am excited to be working on the track this year! In this post I'd like to introduce a few of the themes for the management track.Read more...
September 19, 2012 3:31 PM By Kevin Albano
Given the dedication and persistence of attackers, no one is immune from network security breaches. More often than not, organizations learn of a security breach from an external source. This post explores victim notifications and factors to consider before and after receipt of a notification.Read more...