FireEye, Inc. is a publicly listed enterprise cybersecurity company that provides products and services to protect against advanced cyber threats, such as advanced persistent threats and spear phishing. Founded in 2004, the company is headquartered in Milpitas, California.

Wikipedia
FireEye, Inc.
FireEye, Inc.
Blog Post
  • The concept of “Threat Hunting” has taken on a variety of meanings and interpretations in recent years, ranging from very simplistic measures to more complex tactics. Simplistic measures have included copying a list of atomic indicators and searching for them retroactively across an environment. Using this hunting method misses the mark because data can quickly grow stale, and the metho...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • Introduction Exploit kit (EK) use has been on the decline since late 2016; however, certain activity remains consistent. The Magnitude Exploit Kit is one such example that continues to affect users, particularly in the APAC region. In Figure 1, which is based on FireEye Dynamic threat Intelligence (DTI) reports shared in March 2017, we can see the regions affected by Magnitude EK activ...

FireEye, Inc.
FireEye, Inc.
YouTube Video
  • セキュリティ・プロセスの連携:あらゆる組織のためのベスト・プラクティス - セキュリティ・オペレーションの効率化と自動化は、人員配置と予算の最適化につながります。

FireEye, Inc.
FireEye, Inc.
YouTube Video
  • 標的型攻撃対策のファイア・アイと富士通の自動連携ソリューションをご紹介します。ファイア・アイがなぜ選ばれるのか、そして、富士通のセキュリティ製品との連携により、高度なセキュリティ対策をより効果的に、運用負荷をかけることなく実現できる仕組みを簡単に解説しています。ファイア・アイと富士通の連携ソリューションについては、こちらのURLをご覧ください。 http://www.fujitsu.com/jp/products/network/security/fireeye/

FireEye, Inc.
FireEye, Inc.
Blog Post
  • Today’s threat landscape is constantly evolving. It seems that every few hours we are observing some new or improved type of sophisticated attack. While threats are keeping defenders busy, the truth is that many other factors are making it difficult for organizations big and small to secure their networks. To combat the shortage of security experts, inefficient processes, complex techno...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • Another year, another successful Flare-On Challenge. I’d first like to thank our challenge authors for their hard work developing each of the challenges, and also for writing up their solutions: Challenge #1: Dominik Weber (@Invalid_handle) Challenge #2: Nhan Huynh Challenge #3: Matt Williams (@0xmwilliams) Challenge #4: James T. Bennett (@jtbennettjr) Challenge #5: Tyler Dean (@spre...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • The increasing number of software supply chain compromises represents a significant weakness that should be top of mind for security professionals. Regardless of your firm’s core business, chances are they rely on and are connected to a range of software provider’s electronic distribution channels for acquiring initial licenses or software updates. Any such electronic access, even throug...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • The shift to an intelligence-led security program can seem daunting. When implementing Cyber Threat Intelligence (CTI) capabilities, there may be a degree of uncertainty across the organization. We’ve seen this happen many times with client teams who initially were not cyber security savvy; however, after the adjustment period, when CTI is fully integrated into their technology and busin...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • I recently sat down with Jeffrey Ashcraft, senior analyst at FireEye, and Matthew McCabe, senior vice president and advisory specialist at Marsh, to discuss cyber threats to the utilities sector and how much of what you see hackers do in the movies really happens when utilities are breached in the real world? Listen to the podcast to find out what the difference between an espion...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • We can confirm that FireEye devices detected and stopped spear phishing emails sent on Sept. 22, 2017, to U.S. electric companies by known cyber threat actors likely affiliated with the North Korean government. This activity was early-stage reconnaissance, and not necessarily indicative of an imminent, disruptive cyber attack that might take months to prepare if it went undetected (judgi...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • How long has it been since you reviewed the efficacy of your email security solution? If your organization has been trusting out-of-the-box solutions and believing that your email security is good enough to protect you from most attacks, you may want to reconsider. Here are five reasons why your email security solution should be periodically reviewed. Reason 1: Email and related...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • The next time you are walking through your favorite retail store, take a moment to stop and look upward. There is a strong chance that you will find a video camera just a few feet above your head, recording your every move. These cameras are used to detect activity that may lead to loss via theft and ensure the overall safety of store patrons. While security cameras aren’t a new concept,...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • Anyone who opens up a newspaper these days understands that information security is getting big press.  Unfortunately, our field often receives press for all the wrong reasons.  Many people harness all this media attention to paint a dark, stormy picture of fear, uncertainty, and doubt (FUD). It’s like hearing the Rolling Stones’ song, Doom and Gloom, playing on a never-ending loop. (BTW...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • Rolling out over the next few weeks is Visa Threat Intelligence (VTI), powered by FireEye – the security intelligence platform designed for any organization managing payments. A video walkthrough of the VTI portal can be seen below, but we wanted to present the key types of Threat Intelligence – such as the <a href="/content/fireeye-www/en_US/blog/threat-research/2015/12/fin1-targets-boot-...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • A number of new features in FireEye Endpoint Security HX 3.0 redefine what protecting endpoints is all about. Historical endpoint protection (EPP) solutions use a stale database of threat signatures to stop known threats. This only works if the system has signatures for every possible threat, and that’s not possible. First if a threat is blocked, threat actors will find malware that can...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • If you missed our recent webinar with Rick Holland from Forrester Research, <a href="http://info.isightpartners.com/vendor-landscape-forrester-research-threat-intel-providers">check out the recording here. Rick provided a sneak peek into Forrester's upcoming Threat Intel Market report that will be published shortly. He described five key tenets that distinguish threat int...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • As we interact with our customers and partners, we've run into instances where users aren't yet leveraging ThreatScape API 2, which was released <a href="http://www.isightpartners.com/2015/01/announcing-threatscape-api-version-2/">early this year. When we talk to our users about it further, the reasoning we're hearing is that they're not sure what changes they ha...

FireEye, Inc.
FireEye, Inc.
Blog Post
FireEye, Inc.
FireEye, Inc.
Blog Post
  • In this blog post we will briefly discuss what we at FireEye are doing in data science and what we think the metaphorical “self-driving car” might look like. While we don’t think that detection algorithms should take the human out of the loop, we think they can help automate and become a force multiplier, helping security teams find and focus on the evidence that most likely points to co...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • Today, IPS is deployed for two primary use cases.  First is compliance (SOX, HIPAA, etc.). This is pretty boring and self-explanatory so feel free to yawn right now. The second is server-side protection. IPS does provide effective and legitimate server protection against cyber attacks. But there are two major problems with IPS that plague its effectiveness: Too many alerts—IPS is signat...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.