FireEye Whitepapers


Sort by: Date | Company | Title


Australia Mandatory Data Breach Notification Report
By FireEye | 28/2/2018

Australian businesses face an eye-opening transition to the new notifiable data breaches (NDB) scheme as the new legislation requires companies to notify the Privacy Commissioner, and any affected individuals, of any data breach that meets the legislative parameters within 30 days.

This white paper summarises what you need to know about the legislation, how it will affect Australian businesses, as well as some tips for how to be prepared and how best to respond publicly to any potential data breach.

Download the report to find out more.

Download this now


Using Metrics to Mature Incident Response Capabilities
By FireEye | 26/2/2018

Incident response requires a symbiotic relationship between people, process and technology. Organizations can take several recommended steps to diminish the threat; however, the risk of compromise can never be eliminated. Knowing this, Mandiant recommends that companies focus on improving the cycle time for their incident response process, defining this as a function of the time between initial compromise and threat containment. To this end, metrics play a key role in maturing an organization’s incident response capability.

Download this now


12 Proven Cyber Incident response Strategies
By FireEye | 26/2/2018

Cyber threats are constantly evolving, increasing in both sophistication and how they impact victims. In today’s world, you must battle a wide range of adversaries, from hacktivists to state sponsored threats. The most significant of these threats are advanced attackers who carefully plan and execute breaches into victim organizations. These targeted attackers quietly insert themselves into your environment, leveraging legitimate credentials to survey the environment and dig in deeper for extended operations. They can stay hidden for months—or years—all while advancing their mission, be it stealing your data or using your organization’s environment as a way to infiltrate another victim.

Download this now


How to Enhance Your Security Team
By FireEye | 26/2/2018

IT’S A DAUNTING TASK FOR ANY ORGANIZATION TO FIND, HIRE, TRAIN AND RETAIN THE TALENT IT TAKES TO CREATE A WORLD-CLASS CYBERSECURITY TEAM.

Download this now


CISO Guide to Next Generation Threats - Combating Advanced Malware, Zero-Day and Targeted APT Attacks
By FireEye | 26/4/2012

Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and Web gateways.1 Today’s attacks look new and unknown to signature-based tools because the attacks employ advanced malware and zero-day vulnerabilities. To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive and real time. Read on.

Download this now


Spear Phishing Attacks - Why they are successful and how to stop them
By FireEye | 26/4/2012

There's been a rapid shift from broad, scattershot attacks to advanced target attacks that have had serious consequences for victim organisations. The increased use of spear phishing is directly related to the fact that it works, as traditional security defences simply do not stop these types of attacks. This paper provides a detailed look at how spear phishing is used within advanced attacks and the key capabilities organisations need in order to effectively combat these emerging and evolving threats.

Download this now