The security sector is ever frothy and acquisitive. Just last week Palo Alto Networks grabbed Expanse for $800 million. Today it was FireEye’s turn, snagging Respond Software, a company that helps ...
MILPITAS, Calif.--(BUSINESS WIRE)--FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today released the results of its Email Threat Report. Based on the analysis of a sample set of ...
If one of the biggest names in cybersecurity can be breached, what chance does an average person stand against hackers? That's a likely question after high-profile cybersecurity firm FireEye earlier ...
FireEye security researchers warn that the proliferation of hacking tools with capabilities for targeting industrial control systems (ICS) is lowering the entry bar for attackers and increasing risks ...
The security industry is reverberating with news of the FireEye breach and the announcement that the U.S. Treasury Department, DHS and potentially several other government agencies, were hacked due ...
FireEye is bringing together its security products under a single, integrated platform, a move it says will help partners move away from point solutions and provide an overall better security outcome.
Stagnancy in price action after the last earnings beat provides a buying opportunity as FireEye positions to capture gains in key growth niches. A closer assessment of risk enables the need to ...
The cybersecurity firm FireEye (FEYE) said Tuesday that it had come under cyberattack by “highly sophisticated” actors likely sponsored by a nation-state, in a rare and extremely serious instance of a ...
News broke this week that hackers penetrated one of the world's leading cybersecurity companies and stole its hacking assets — and experts say companies should brace for those tools to be used against ...
You can’t see some malware until it’s too late. Sophisticated attacks arrive in pieces, each seemingly benign. Once these advanced attacks reassemble, the target is already compromised. FireEye takes ...
You wouldn't get too far trying to drive by looking in the rear view mirror. But since they compare incoming network traffic to a database of previously detected malware, that's what most companies do ...