Photos
Videos
FireEye Heroes
85
10
Why Most Security Solutions Aren’t Enough
50
3
Black Hat 2016: FireEye HX Endpoint Security
93
11
Posts

Our Director of Intelligence Analysis, John Hultquist spoke to The New York Times on how the #Olympics has become a target for hackers: http://bit.ly/2BiAGjc

Some computer systems connected to the 2018 Games in Pyeongchang, South Korea, have already been compromised, experts said. The big question is what happens next.
nytimes.com

We take a lot of pride in protecting the city by the bay.

It looks like you may be having problems playing this video. If so, please try restarting your browser.
Close
494 Views
Posts

Don't forget to join our 11am SGT webinar with Marsh on the APAC cyber evolution & the route to strengthening resilience in the region http://bit.ly/2EqL5es

The cyber threat landscape is morphing constantly and dramatically. Around the world, cyber dependency grows as increasing digital interconnection among people, things, and organisations expand. Asia-Pacific (APAC) is no different. From currency volatilit...
brighttalk.com

Our CMO, Vasu Jakkal will be a featured panelist discussing how to build a secure future for women in cybersecurity.

Don't miss this important discussion and register at http://bit.ly/2Bck1xz

Aside from breaches, ransomware attacks, and insider threats, another large issue faced by the cyber security industry is diversity, or lack thereof. Making the industry more appealing to women and then eventually retaining female talent are both challeng...
brighttalk.com

We assess that the threat actors employing the latest Flash zero-day (CVE-2018-4878) are a suspected North Korean group we’re tracking as TEMP.Reaper: http://bit.ly/2BQJh9a

Image may contain: one or more people, people sitting and text

If you're a seasoned #SaaS commercial product engineering leader with a passion for site reliability engineering (SRE), we want you to be our VP of Infrastructure Operations!

Learn more about this opportunity here: http://bit.ly/2npQQiR

Image may contain: one or more people, mountain, text, outdoor and nature

Hear from our Chief Intel Strategist, Chris Porter on The CyberWire podcast as he talks about #cybersecurity threats to watch for in 2018. You can listen to the episode here: http://bit.ly/2BBAd83

In this CyberWire special edition, we’ve gathered a group of seasoned cyber security experts to share their views on what we might expect over the coming year. Nate Beach-Westmoreland is Head of Strategic Threat Intelligence at Booz Allen's Cyber4Sight. Christopher Porter is Chief Intelligence Str...
thecyberwire.com

Our Mandiant ICS Security Consultant, Blake Johnson presented technical details about #TRITON malware last week at #S4x18.

Blake Johnson led the on-site Mandiant investigation of the operational technology incident where the TRITON framework was recovered. So who better to discus...
youtube.com

Our Global Government CTO, Tony Cole spoke with Politico on the focus of #cybersecurity at this year’s World Economic Forum: https://feye.io/2n7ab8k #WEF18

House, Senate reckon with their own computer defenses — Trump to renew Obama-era cyber tool
politico.com

Fortunately, the regulatory climate in #APAC is changing – slowly but surely. Although most APAC countries today are not legally obliged to report any cyber incidents and many remain silent, countries such as Singapore and Australia already have plans to adopt mandatory breach notification laws in 2018.

We encourage you to read our latest white paper to learn how you can build and strengthen your organization's enterprise cyber resilience: https://www2.fireeye.com/OFFER-WP-CYBER-EVOLUTION-APAC.html

The time between an attacker compromising a secured network and the breach being detected is the highest in the APAC region, with the median 'dwell' time 73 days above the global median of 99 days.
zdnet.com

#IDAPro Users: We released a new plug-in for IDA Pro called "Simplify Graph" to help you automate creation of groups of nodes in the IDA’s disassembly graph view. Read about it here: http://bddy.me/2msW0Ks

Code and binaries are available at our GitHub repo: http://bddy.me/2mumqve

No automatic alt text available.

Our latest podcast episode featuring our cyber analyst, Parnian Najafi Borazjani and Michael Rastigue, Vice President at Marsh, touches on motivating factors for #cybersecurity attackers to target the manufacturing industry: http://bddy.me/2mnqcqq

No automatic alt text available.

We tested the supported versions of our Endpoint Security Agent with the Microsoft update for Meltdown and confirmed the update doesn’t affect the abilities of the agent, and that there are no compatibility issues with the update. Learn more in our blog post: http://bddy.me/2m4dmNs

Image may contain: 1 person

Our APAC CTO, Bryce Boland spoke with Bloomberg on how the newly discovered #spectre and #meltdown CPU vulnerabilities may be around for a while: http://bddy.me/2m2IlcN

Image may contain: 2 people, text

We've partnered with Marsh & McClennan on a white paper focused on the shifting #cybersecurity threat landscape across Asia-Pacific. Get your copy here: http://bddy.me/2lRZDtb

Image may contain: text
FireEye, Inc. updated their cover photo.
January 3
Image may contain: mountain, sky, outdoor, nature and text