FireEye Whitepapers


Sort by: Date | Company | Title


Australia Mandatory Data Breach Notification Report
By FireEye | 28/2/2018

Australian businesses face an eye-opening transition to the new notifiable data breaches (NDB) scheme as the new legislation requires companies to notify the Privacy Commissioner, and any affected individuals, of any data breach that meets the legislative parameters within 30 days.

This white paper summarises what you need to know about the legislation, how it will affect Australian businesses, as well as some tips for how to be prepared and how best to respond publicly to any potential data breach.

Download the report to find out more.

Download this now


The business case for protecting against advanced attacks: Demonstrating ROI to non-technical executives
By FireEye | 10/7/2015

This whitepaper looks at how to demonstrate the potential return on investment (ROI) of an enterprise-class advanced security solution to non-technical executives with a with a checklist of the key points you need to emphasise for a positive outcome. Your executives need to know the challenges you face and the risk if you don’t find solutions.

Download this now


Security reimagined, Part 1: An adaptive approach to cyber threats for the digital age
By FireEye | 10/7/2015

Conventional security detects threats too late (if at all), and resolves them too slowly. It gives security teams a fragmented, incomplete view into what’s going on in their network. It’s passive and blind to broader threat trends. And it reacts too slowly to new threats and changing conditions. Discover the 10 components to re-imagining security with adaptive defence.

Download this now


M-Trends® 2015: A view from the front lines
By FireEye | 10/7/2015

While we have seen modest gains in organisations’ ability to attack the security gap, advanced (and not-so advanced) threat actors continue to evolve their tactics to find a way through it. This whitepaper looks at the developments for 2015 and how these developments paint a threat landscape that is more complex than ever.

Download this now


FireEye Advanced Threat Report – 2H 2011
By FireEye | 3/7/2012

The FireEye Advanced Threat Report for the second half of 2011 is based on research and trend analysis conducted by the FireEye Malware Intelligence Labs. This report provides an overview of advanced targeted attacks in the second half of 2011 and was developed to provide insights into the current threat landscape, evolving advanced persistent threat (APT) tactics, and the level of infiltration seen in organisational networks today. This is not a typical threat report with just tallies of the millions of well-known malware or billions of spam messages. Read more.

Download this now


Protecting Against Advanced Malware and Targeted APT Attacks
By FireEye | 3/7/2012

Defending against next generation threats requires a strategy that moves beyond signatures and behavioural heuristics. Over 95% of businesses unknowingly host compromised endpoints, despite their use of traditional next-generation firewalls, intrusion prevention systems (IPS), antivirus and Web gateways. Read more.

Download this now


CISO Guide to Next Generation Threats - Combating Advanced Malware, Zero-Day and Targeted APT Attacks
By FireEye | 26/4/2012

Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and Web gateways.1 Today’s attacks look new and unknown to signature-based tools because the attacks employ advanced malware and zero-day vulnerabilities. To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive and real time. Read on.

Download this now


Spear Phishing Attacks - Why they are successful and how to stop them
By FireEye | 26/4/2012

There's been a rapid shift from broad, scattershot attacks to advanced target attacks that have had serious consequences for victim organisations. The increased use of spear phishing is directly related to the fact that it works, as traditional security defences simply do not stop these types of attacks. This paper provides a detailed look at how spear phishing is used within advanced attacks and the key capabilities organisations need in order to effectively combat these emerging and evolving threats.

Download this now