Five best practices to improve threat report action & analysis
While many organisations use a TIP to make data actionable for detection and protection, far fewer use a TIP for forensics.
Gigamon & FireEye tackle security in hybrid cloud environments
The partnership is an extension to a ‘long-standing’ relationship that aims to ‘simplify, secure, and optimise hybrid cloud environments’.
Attivo Networks integrates with FireEye for advanced threat protection
The combined solution is designed to reduce time and resources required to detect and block attacks, while also collecting forensics to help organisations avoid future attacks.
FireEye revamps its flagship anti-malware solution
The Endpoint Security solution has received several enhancements, including the availability of several new modules for protection, investigation and response.
FireEye unveils Cloudvisory: A multicloud security control centre
FireEye has announced the availability of FireEye Cloudvisory - a control centre for cloud security management across any private, public or hybrid security environment.
FireEye snaps up Cloudvisory, looks to extend cloud security offerings
FireEye will utilise Cloudvisory’s technology to add new capabilities to FireEye Helix, including monitoring for multi-cloud environments, management for hybrid-cloud firewalls and integrated security for container platforms.
FireEye rolls out threat intelligence platform for industrial systems
Now industrial control systems (ICS), operational technology (OT), internet of things devices, and other equipment used to manage interconnected physical processes, can be secured from cyber threats.
FireEye brings machine learning to endpoint security solution
The machine learning model is trained with both public and private data sources, including data gathered from over 15 million endpoint agents.
FireEye & Gigamon combine security firepower through new alliance
The alliance will allow companies and channel partners to unify global sales and deployments and bring more effective security solutions to customers.
Riverbed appoints former Zscaler A/NZ country manager
Riverbed Technology says the appointment of Sean Kopelke couldn't be better timed as he holds many valuable attributes.
Chinese threat actor linked to leak of more than 200 million Japanese PII datasets
Leaked personal information includes names, credentials, email addresses, dates of birth, phone numbers, and home addresses.
34 tech heavyweights stand strong: Protecting the globe from cyber threats
Not only with the companies protect customers, they've also vowed not to help governments who want to go on the cyber offensive.
Expert insights: Should we be preparing for cyberwar with Russia?
Days after the missile strike on Syria by Western powers, fears are growing over a potential retaliation by Russia - here's what the experts think.
175 days to detect a network intruder in EMEA - just 77 in US
A study has revealed the median time for an EMEA business to detect an intruder is more than double that in the US - and it's much worse in APAC.
The 475-day siege: APAC firms' breach detection times are getting worse
“Defenders have to get it right every single time, while threat actors only need to get it right once.”
New Panda Banker campaign targets Japan's financial institutions
Popular banking malware Panda Banker, also known as PandaBot and Zeus Panda is reportedly targeting Japan’s financial institutions for the first time.
China cyberespionage group targets US maritime & engineering sectors
A China-based cyberespionage group may be targeting United States engineering and maritime industries tied up in activities about the South China Sea.
State-sponsored North Korean cyberespionage group continues to weaponize tactics
The North Korean threat group known to some as Reaper (APT37) is eyeing bigger targets with more sophisticated tactics.
North Korean threat group suspected to be behind Adobe Flash exploit
An exploit that targeted an Adobe Flash vulnerability looks to be the work of a North Korean group called TEMP.Reaper.
Zyklon HTTP malware creates gaping backdoors through MS Office exploits
Zyklon HTTP malware is described as a publicly-available and fully featured backdoor that is able to conduct DDoS attacks, steal passwords...
FireEye Picks up X15 Software in big data push
FireEye says the acquisition is expected to give them significant additional data management capabilities.
Frost & Sullivan analyses FireEye's progression in SIEM space
Traditional SIEM use cases include compliance, storage & forensic investigation, but it is evolving to include many more features for threat response.
"Victory for the good guys" - criminal behind Mandiant hack arrested
FireEye has caught the hacker behind a well-publicised attack that leaked a security researcher’s details
North Korean criminals behind phishing attack on US power companies
“North Korean actions are consistent with a desire to demonstrate a deterrent capability rather than a prelude to an unprovoked first-strike."