Resources https://www.mandiant.com/ Mandiant's RSS Feed en APT41 (Double Dragon): A Dual Espionage and Cyber Crime Operation https://www.mandiant.com/resources/report-apt41-double-dragon-a-dual-espionage-and-cyber-crime-operation mdithomas https://www.mandiant.com/resources/report-apt41-double-dragon-a-dual-espionage-and-cyber-crime-operation APT38: Un-usual Suspects https://www.mandiant.com/resources/report-apt38-un-usual-suspects mdithomas https://www.mandiant.com/resources/report-apt38-un-usual-suspects Suspected Iranian Influence Operation https://www.mandiant.com/resources/report-suspected-iranian-influence-operation mdithomas https://www.mandiant.com/resources/report-suspected-iranian-influence-operation APT37 (Reaper): The Overlooked North Korean Actor https://www.mandiant.com/resources/report-apt37-reaper-the-overlooked-north-korean-actor mdithomas https://www.mandiant.com/resources/report-apt37-reaper-the-overlooked-north-korean-actor The Business Case For Protecting Against Advanced Attacks: Demonstrating ROI to Non-Technical Executives https://www.mandiant.com/resources/report-the-business-case-for-protecting-against-advanced-attacks-demonstrating-roi-to-non-technical-executives mdithomas https://www.mandiant.com/resources/report-the-business-case-for-protecting-against-advanced-attacks-demonstrating-roi-to-non-technical-executives Definitive Guide to Advanced Threat Protection: Defeating Your Cyber Enemies https://www.mandiant.com/resources/report-definitive-guide-to-advanced-threat-protection mdithomas https://www.mandiant.com/resources/report-definitive-guide-to-advanced-threat-protection IANS Research Survey: Building a Better Budget for Advanced Threat Detection and Prevention https://www.mandiant.com/ians-research-survey-building-better-budget-advanced-threat-detection-and-prevention mdithomas https://www.mandiant.com/ians-research-survey-building-better-budget-advanced-threat-detection-and-prevention NIST: Best Practices in Cyber Security Chain Risk Management https://www.mandiant.com/resources/nist-report-best-practices-in-cyber-security-chain-risk-management mdithomas https://www.mandiant.com/resources/nist-report-best-practices-in-cyber-security-chain-risk-management Forrester: Determine The Business Value Of An Effective Security Program — Information Security Economics 101 https://www.mandiant.com/resources/forrester-research-report-determine-the-business-value-of-an-effective-security-program mdithomas https://www.mandiant.com/resources/forrester-research-report-determine-the-business-value-of-an-effective-security-program IANS: Data Compromise Awareness https://www.mandiant.com/resources/ians-report-data-compromise-awareness mdithomas https://www.mandiant.com/resources/ians-report-data-compromise-awareness