The Mandiant With a Plan – High-Profile Threat Report, New Products (451 Research)
Mandiant took a gutsy step in publishing a threat report, profiling in great detail a particularly active and well-known group of attackers...and accusing them of being part of, or at least supported by, the Chinese government.
Determine The Business Value Of An Effective Security Program — Information Security Economics 101
Cybercriminals know the value of the information they steal and can quickly convert their loot to cash. CISOs need to combat this reality with financial models of their own to focus security efforts on information assets that produce the most current and future revenue.
A New Cloud-Based Security Alerting Service from Mandiant (451 Research)
Mandiant has been growing its business as an incident-response expert. Once a customer has been through the detection, containment and recovery cycle, and has resigned itself to the fact that there will be another attack, its attention turns to automation.
Planning for Failure (Forrester Research)
The report addresses the reality that “[you] can't stop every cyberattack. However, your key stakeholders, clients, and other observers do expect you to take reasonable measures to prevent breaches in the first place, and when that fails, to respond quickly and appropriately.”