FireEye, Inc. is a publicly listed enterprise cybersecurity company that provides products and services to protect against advanced cyber threats, such as advanced persistent threats and spear phishing. Founded in 2004, the company is headquartered in Milpitas, California.

Wikipedia
FireEye, Inc.
FireEye, Inc.
Blog Post
  • This week we are joined by Dan Perez (<a href="https://twitter.com/MrDanPerez">@MrDanPerez) of FireEye’s Adversary Pursuit team. We discuss our experiences from last month’s congressional roundtable on artificial intelligence, provide insight into the analysis leading up to our report on TEMP.Periscope targeting Cambodian election operations, and break down several notable adversary meth...

FireEye, Inc.
FireEye, Inc.
YouTube Video
  • In this episode we were joined by Dan Perez (@MrDanPerez) of FireEye’s Adversary Pursuit team. We discussed our experiences from FireEye's Congressional roundtable on artificial intelligence, providing insight into the analysis leading up to our report on TEMP.Periscope targeting Cambodian election operations, and broke down several notable adversary methods observed during the past few weeks of r...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • Good <a href="https://www.fireeye.com/solutions/cyber-threat-intelligence.html">intelligence is key to defending government agencies against cyber security threats. It’s only natural that agency leaders are interested in establishing cyber threat intelligence programs. However, an effective program depends on knowing what it means to have ‘good intelligence’ in the first place. One appr...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • With so much attention being paid to protection and detection technologies, very little thought is given to response-related technologies such as network forensics, which play a critical role in any enterprise security architecture. Knowing that network forensics plays a critical role in an advanced threat defense posture, FireEye is pleased to unveil new high-performance network forens...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • In his new book, "The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age," author David E. Sanger chronicles numerous examples of the impact of cyber activities on geopolitical conditions. One such example involves the scale and scope of the Chinese Army's economic and industrial espionage targeting organizations for commercial gain, which was uncovered by Mandiant after a multi-ye...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • You’ve heard it before – cyber threats are inevitable. But that’s no reason to put your enterprise’s response behind the eight ball. If anything, it is a call to ensure you’re doing everything you can to stay ahead of threat actors. Cyber is no longer solely an IT risk; businesses must prepare company-wide for a breach. A compromise can damage an enterprise’s reputation, brand, and bank ...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • On this episode of State of the Hack, we are joined by Andrew Thompson of FireEye’s Adversary Pursuit team. We explore the evolution and current state of cloud services OAuth abuse, how we do technical intelligence and attribution, and some war stories from the past few weeks of responding to intrusions that matter. Episode Recap and More Information "Shining a Light on OAuth Abuse": ...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • With cyber threats evolving every day and the bad guys becoming increasingly creative with their attacks, the need for organizations to develop and tighten security measures has never been greater. Additionally, attacker targeting has expanded, meaning organizations of all sizes can no longer get by with just basic levels of protection. In fact, smaller organizations are more attractive ...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • FireEye Email Security took top honors at SC Awards Europe 2018, and it’s little wonder: we’ve gotten very positive feedback from our growing base of email security customers. This award for Best Email Security Solution – presented at an event in London on June 5 – is a reflection of FireEye’s focus on innovation and our continued commitment to solving our customers’ biggest challenges....

FireEye, Inc.
FireEye, Inc.
YouTube Video
  • Delivering best-in-class Results with state-of-the-art protection: Not all security solutions are created equal – hear how the acclaimed CISO for Texas Children’s Hospital has adopted an integrated, multi-pronged strategy to safeguard his organization’s outstanding efforts in patient care, education and research.

FireEye, Inc.
FireEye, Inc.
YouTube Video
  • In May we were joined by Andrew Thompson (@QW5kcmV3) of FireEye’s Adversary Pursuit team. We explore the evolution and current state of cloud services OAuth abuse, how we do technical intelligence & attribution, and some war stories from the past few weeks of responding to intrusions that matter. “Shining a Light on OAuth Abuse”: we explore the history of OAuth abuse in-the-wild and the uptick in...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • Malware such as ransomware and cryptocurrency miners commonly enter inboxes as attachments and have the potential to cause serious problems if downloaded; however, another type of email attack is on the rise. This often <a href="https://www.fireeye.com/blog/products-and-services/2018/04/the-future-is-bright-for-fireeye-email-security.html">malware-less threat is known as </a><a href="https...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • The mark that Hurricane Katrina left when it slammed down on the City of New Orleans in 2005 was so severe that the community is still feeling the effects today, nearly 13 years later. However, despite the destruction, the locals were not deterred. Instead, they vowed to rebuild bigger and better than before – everything from the streets to the buildings to the technological infrastructu...