Part one of our three-part series on victim notifications introduced the concept of victim notifications and the basics of preparing for a notification. The second post of the series provided details on how companies can prepare for, validate, and respond to victim notifications. This post concludes the three-part series with a brief discussion around issues that organizations that provide victim notifications face and recommendations for how they can provide notifications in a practical and effective manner.Read more...
Entries filed under 'Federal Bureau of Investigation'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
October 1, 2012 6:35 PM By Carlos Carrillo
September 19, 2012 3:31 PM By Kevin Albano
Given the dedication and persistence of attackers, no one is immune from network security breaches. More often than not, organizations learn of a security breach from an external source. This post explores victim notifications and factors to consider before and after receipt of a notification.Read more...