Two-factor solutions can be highly effective defensive tools in your fight against advanced attackers when implemented securely. Your overtaxed and understaffed security team is likely already facing 99 other security problems - don’t let two-factor authentication be one.
Read more...Entries filed under 'Pen Test'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
The Five W’s of Penetration Testing
September 16, 2014 4:49 PM By Chuck WillisOften in discussions with customers and potential customers, questions arise about our penetration testing services, as well as penetration testing in general. In this post, we want to walk through Mandiant's take on the five W's of penetration testing, in hopes of helping those of you who many have some of these same questions. For clarity, we are going to walk through these W's in a non-traditional order.
Read more...