All Research Sponsored By:FireEye

-
A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
-
Beyond the Breach
This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
-
Analyzing Four Widely Exploited Java Vulnerabilities
This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
-
DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
-
How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
This white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers.
-
World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
-
The Definitive Guide to the Next Generation of Threat Protection
This in-depth eBook examines the next generation of threat protection and provides key insights into critical topics, such as advanced persistent threats and zero-day attacks.
-
Advanced Attacks Require Federal Agencies to Reimagine IT Security
This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
-
Supply Chain Analysis: From Quartermaster to Sunshop
This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
-
Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
-
Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
-
FireEye Advanced Threat Report - 2H 2011
This FireEye Advanced Threat report provides key insight into the current threat landscape, the evolution of advanced persistent threat (APT) tactics and the level of infiltration seen in networks today. View now to gain an in-depth look into key findings to help you build and improve your security strategies to tackle today's security issues.
-
FireEye 1H 2011 Advanced Threat Report
This FireEye Advanced Threat report offers a global view into the cyber attacks that routinely bypass traditional defenses, using the threat data shared by thousands of FireEye Malware Protection Systems (MPS) deployments. View now to explore key findings in this analysis that uncover the real security issues enterprises face today.
-
The New Status Quo: Zero-Day and Targeted APT Attacks
During the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime.
-
Case Study: Providence College Captures Previously Undetected Attacks with FireEye Web Malware Protection System
This case study will show how Providence College was able to keep there network secure from advanced malware attacks, and how this security solution could do the same for you.
-
Case Study: A Large Multi–Program National Laboratory Stays Ahead of Next-Generation Malware By Deploying FireEye Web Malware Protection System
This case study will outline how one company trusted FireEye's Web Malware Protection System to guard their highly sensitive information and how well the system performed. You will also learn about the features the security solutions contains and how it could be perfect for your business.