FireEye

In its Cyber Security Predictions 2019, FireEye said that more nations will develop offensive cyber capabilities in 2019.

Cyber Security Predictions 2019: More nations to develop offensive cyber capabilities, says FireEye

In its Cyber Security Predictions 2019, FireEye said that more nations will develop offensive cyber capabilities in 2019.
FireEye Q4 and Full Year 2017 Results announced: Expect revenue of $825 million in 2018

FireEye Q4 and Full Year 2017 Results announced: Cybersecurity firm expects revenue of $825 million in 2018

FireEye reported revenue of $202.3 million in Q4 and in 2017, revenue of $751.1 million, that is an increase of 5 percent from 2016.
North Korean, Cybersecurity, Adobe Flash Zero-Day, FireEye

North Korean group behind Adobe Flash Zero-Day vulnerability: FireEye

FireEye said that North Korean group seems to behind Adobe Flash zero-day vulnerability which was highlighted by KISA (KrCERT) on January 31 and confirmed by Adobe on February 1.
Kevin Mandia, CEO, FireEye, Technology, Cyber Security, Security Business, Cybersecurity Predictions for 2018, Kevin Mandia Interview

Cybersecurity Predictions for 2018: Majority of breaches we respond to, are state-sponsored, or state condoned, says Kevin Mandia, CEO, FireEye

There is no one nation, five nations, or collection of 20 nations that are holding all nations accountable to abide by any rules of engagement on cybersecurity, says Kevin Mandia.
Grady Summers, Executive Vice President and Chief Technology Officer, FireEye

Cyber Security: Rules of engagement have broadened, says Grady Summers, CTO, FireEye

Initial cybercrime game was primarily espionage – governments and militaries spying on one another. Quickly the game changed a few short years later, when hackers started using Windows NT to carry out cybercrime. And later on it moved to militaries pivot in the mid- 2000s and begin hacking the private sector, a sign that the rules of engagement were starting to broaden.

Six cybersecurity weaknesses that competitors can use to undermine your business

Unauthenticated protocols, outdated hardware, weak user authentication, weak file integrity checks, vulnerable windows operating systems, undocumented third-party relationships may help your adversaries undermine your industrial operations, says FireEye.
- Advertisement -SAP Hana