Two-factor solutions can be highly effective defensive tools in your fight against advanced attackers when implemented securely. Your overtaxed and understaffed security team is likely already facing 99 other security problems - don’t let two-factor authentication be one.Read more...
Entries filed under 'Mandiant'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
December 7, 2015 8:00 AM By Dimiter Andonov, Willi Ballenthin, Nalani Fraser, Will Matson, Jay Taylor | Advanced Malware
A threat group is targeting payment card data using sophisticated malware that can continue operating even after the operating system has been reinstalled.
January 12, 2015 6:11 PM By Jennifer Bielski
2014 brought about a multitude of high-profile breaches, critical vulnerabilities, and newly-discovered threat groups. Has this exposure and awareness changed the way companies are approaching security, incident detection, and containment and response? How will targeted attacks continue to evolve? I sat down with Ryan Kazanciyan, Technical Director at Mandiant, to learn more about what we can expect in 2015.Read more...
Understanding the Importance of Industrial Control System Security, Interview with Dan Scali, Manager Industrial Control SystemsNovember 24, 2014 4:30 PM By Jennifer Bielski
Mandiant recently held the webinar From the Front Lines: The Industrial Evolution - Transforming Security for Critical Infrastructure, which focused on threats to Industrial Control System (ICS) and the challenges organizations are facing to secure these gaps and vulnerabilities. I caught-up with one of the presenters, Dan Scali, Manager, Industrial Control Systems, to further discuss ICS Security and what can be done to mitigate the risk to these systems.Read more...
November 11, 2014 11:00 AM By J. Gomez