Discover new learnings from the FireEye breach, including the objectives of the stolen tools, how those tools would present on the network, and how behavior-based detection can identify their use in an attack.
Read MoreProfiles
Nathan Einwechter
Posts from
Nathan Einwechter

FireEye Breach: Attack Details & How FireEye Rapidly Responded

Count Your 16,000 Most Critical Assets? Are You Nuts?
Asset management is one of the toughest challenges IT organizations can face. Discover why the ability to detect threats early on the network is better than ranking your critical systems.
Read More
DHS Cyber Agency Releases Advisory on Iranian Threats
Over the past decade, cyber operations have become intertwined with geopolitical conflict. In recent asymmetric campaigns, state-sponsored threat groups have mapped critical infrastructure, disrupted systems, held information hostage, and stolen state secrets as a form of warfare.
Read More