Over the last month, we examined the idea of security without borders. A single glance at headlines from the past few months - with news of cyber-attacks involving the AP, Twitter, and 15 of the largest banks in the U.S. - underscores again how organizations are impacted by the world they operate in.Read more...
Entries filed under 'Twitter'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
November 26, 2012 7:02 PM By Richard Bejtlich
As part of November's Career Paths in Cybersecurity Series, Helena asked me to talk about how a digital security professional can raise his or her public profile. For the purposes of this blog post, I will assume that you seek greater publicity so that you can better contribute to the national dialogue over digital security. I will discuss seven concrete steps one can take to accomplish this goal:Read more...
November 15, 2012 7:05 PM By Jed Mitten
The Highlighter™ Super Users series is a little something I've put together to reach out to the Highlighter community. As a user of this freeware tool from Mandiant, I want you to know there are many users out there who can help you get through your log analysis paralysis. This series is meant to highlight (see what I did there?) how some users have solved a various range of problems using Highlighter. These interviews will provide insight into the benefits and pitfalls of using Highlighter, some features you may not be aware of, and a few use cases you may not have considered.Read more...
August 27, 2012 3:51 PM By Richard Bejtlich
June 21, 2010 12:28 AM By Julia Wolf