Back to Results
First PageMeta Content
Computing / Malware / Vulnerability / Network security / Evasion / FireEye /  Inc. / Computer insecurity / Intrusion prevention system / Advanced persistent threat / Computer network security / Cyberwarfare / Computer security


2 How Does Advanced Malware Get Past Traditional Barriers? Addressing Advanced Targeted Threats
Add to Reading List

Document Date: 2013-12-10 16:01:41


Open Document

File Size: 241,69 KB

Share Result on Facebook

City

Milpitas / Reading / /

Company

FireEye / Gartner Inc. / Intrusion Prevention Systems / Microsoft / /

Country

United States / China / /

Event

Diplomatic Relations / Force Majeure / /

IndustryTerm

internal networks / corporate networks / situational awareness technologies / generic http Web traffic / nuclear power plant control networks / social media / Web gateways / social networking sites / threat-detection products / vulnerability management / Web filters / security products / Web security gateway / Internet mechanisms / removable media / nextgeneration firewall products / Web security / event management / average phishing site / change control/configuration management / point products / Web Filtering / legal advice or services / vulnerability testing products / lean-forward tools / prevention systems / Web malware filtering / reputation services / /

Movie

App Stores / /

OperatingSystem

Microsoft Windows / /

Organization

SANS Institute / PCI Security Standards Council / /

Person

Cost Sandboxing / John Pescatore / /

Position

specific threat actor / leader / lean-forward / Forward / active lean-forward / /

Product

Targeted APT Attacks / /

ProvinceOrState

California / /

Technology

situational awareness technologies / signature-based technologies / DNS / firewall / http / /

URL

www.fireeye.com / http /

SocialTag