Showing page 91 of 100 of 1750 results.

Webinar
Every hour, Mandiant Threat intelligence Analysts answer some of the most challenging threat intelligence questions our customers face. Spread across the globe, they develop answers using knowledge, subject matter expertise, and tools that power Mandiant Threat intelligence.
Webinar
Regardless of your organization's size, industry, or locale, there are steps that you can take to identify Exchange exploitation in your environment.
Webinar
One of the hardest questions to answer for any organization is “Could we actually detect a ransomware attack before it’s too late?” With attacker sophistication increasing all the time, there is no guarantee that the policies and plans of yesteryear will still work, nor that the products and automated detections will get there in time.
Webinar
Ransomware is disruptive and costly. Threat actor innovations have increased the potential damage of ransomware infections in recent years, and this trend shows no sign of slowing down. Financially motivated actors will continue to evolve their tactics to maximize the profit generated from successful ransomware attacks.
Webinar
The most crucial aspect of being a Red Teamer is being able to simulate cyber-attack as close as possible to the real thing to aid clients in understanding the very real threats they face. At FireEye, the vast Threat Intelligence and Research ecosystem at the heart of the company provides this; from detailed analysis of the latest ransomware group phishing techniques to reverse engineered nation-state tools and tactics, all aspects must be studied and continuously integrated into the Red Team Operations playbook to stay on the edge. A day in the life will detail how the FireEye Mandiant team of consultants use these systems to enhance the relevancy and accuracy of their Red Team engagements.
Webinar
Malicious cyber operations are not a force of nature. Instead, behind every compromise are human operators using tools and techniques to accomplish various goals.
Webinar
Ransomware is a growing issue across the world, with the number of attacks and ransom values increasing. In this session we will outline our approach to advising some of the world’s biggest companies on this issue.
Webinar
This session explores the benefits of tracking adversary TTPs during day-to-day hunt and incident response operations, and shows how to use the MITRE ATT&CK framework to align organizational cyber components over the long term.