As a follow-up to our recently held State of the Hack: Back to the Remediation webinar, questions answered by presenter Jim Aldridge are listed below.Read more...
Entries filed under 'MIR'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
May 22, 2013 6:10 PM By Helena Brito
November 7, 2012 4:51 PM By M-Labs
Mandiant's Nick Bennett and Jake Valletta discussed data stacking at MIRcon™ last month. If you were unable to attend the talk, we will discuss this data analysis technique here on the M-Unition blog.Read more...
October 18, 2012 3:58 PM By Richard Bejtlich
Digital security professionals usually associate "security awareness" with initiatives to educate employees. The idea is that if the security staff can teach employees to be wary online, they will be less likely to fall prey to various forms of cyber-attack. I agree with this philosophy, and I find it difficult to believe that anyone would argue against training employees. However, security staff should do some level of cost-benefit analysis to ensure that the resources expended on training do not exceed the benefits!Read more...
October 16, 2012 5:34 PM By Jeff Hamm