tag >> fireeye
October 9th, 2017
We have your list of can’t-miss cybersecurity events happening this month. Mark your calendars and learn more about today's evolving threat landscape
October 3rd, 2016
Cybersecurity in government is no longer an afterthought. Security officers are helping to strategically design their networks and systems to comply with cyber demands from the moment they begin considering acquiring a new solution. The entire government cybersecurity community, including industry, academia, executives, and agencies themselves, have committed to work together to counter threats intelligently.
- Akamai, Anomali, CyberArk, CyberSponse, FireEye, HPE, HyTrust, NIST, Recorded Future, Resilient Systems, Splunk, Symantec, Tripwire, Vormetric
September 9th, 2016
Effectively protecting data, infrastructure, and information in today’s threat landscape can be tricky – especially as malicious actors, like multi-national crime syndicates and hacktivists, as well as ransomware and other malware tools, become more complex. Today’s cyber-attacks are more sophisticated, take place at a larger scale, and incorporate more techniques than ever before. Because of this, government agencies find themselves more at odds than ever with this new environment.
August 17th, 2016
As we’ve written here previously, the Federal Risk and Authorization Management Program (FedRAMP), is a federal government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.
March 1st, 2016
In today’s complex threat landscape resistance as a strategy is indeed futile. Instead of worrying about if hackers will get in, organizations of all sizes have turned their attention to what to do when attackers get in. This change in mindset has led to the need for resilience in IT systems.
December 23rd, 2015
As we reflect on Cyber Playbook 2015, we wanted to get post game interviews with some of the star players. First up is Travis Rosiek, Federal CTO, FireEye, who talked to us about some of the major security challenges the government is currently facing
November 5th, 2015
What are we to do when the bad guys use our own technology against us? This is what’s happening everyday as bad actors use the data routes we use - email, applications, data traffic, and more - to get into our systems.
October 28th, 2015
As we wind down cyber security awareness month, we wanted to leave you with some actionable tips for improving the security of increasingly virtualized networks and da