Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Mandiant

Mandiant is recognized by enterprises, governments and law enforcement agencies worldwide as the market leader in threat intelligence and expertise gained on the frontlines of cyber security. To make every organization confidently ready for cyber threats, Mandiant scales its intelligence and expertise through the Mandiant Advantage SaaS platform to deliver current intelligence, automation of alert investigation and prioritization and validation of security controls products from a variety of vendors.

Our Website: https://www.mandiant.com/


Latest Content From Mandiant

Research Report: Security Predictions for 2022 Insights

by MandiantDec 21, 2021

Every year Mandiant puts together cyber security news, experiences and intelligence insights then share it in a report on what to expect over the next 12 months. In 14 Cyber Security Predictions for 2022 and Beyond, Mandiant executives have consolidated their thoughts based on news, behaviors of attackers, victim organizations and nation-states, taking into account events through 2021.


Whitepaper: The Defender's Advantage - a guide to activating cyberdefense

by MandiantDec 21, 2021

As prominent attacks continue to dominate the headlines, security teams are under pressure to detect and respond to malicious activity faster than ever before. Our book "The Defender's Advantage" harnesses Mandiant's expertise, detailing the steps security organizations should take to activate and mature their Cyber Defenses against the latest threats.


Research Report: SANS 2019 Threat Hunting Survey Report

by MandiantMay 29, 2020

This 2019 SANS Threat Hunting Survey Report aims to help organizations understand what threat hunting is, why it is essential to protect their organizations, and how novice and experienced hunters can improve their processes.

The report explores the differing:

  • Definitions of threat hunting
  • Methodologies of performing threat hunting
  • Spending priorities and training needs
  • Tools and system data needed for a successful hunt
  • Effectiveness of hunting practices


E-Book: Case Study: Validating Security & Reducing Risk

by MandiantMay 29, 2020

The case study explores how one of the largest healthcare providers in the U.S. validates security protocols and protects critical assets with an effective security validation program that utilizes automation and an intelligence-driven approach to mitigate risk, optimize controls, and communicate value.

This case study and accompanying video covers:

  • The challenges of cybersecurity for healthcare organizations
  • Measuring and monitoring the efficacy of security tools
  • Reducing cyber risk and protecting critical assets

Research Report: Mandiant Security Effectiveness Report 2020

by MandiantMay 15, 2020

The Mandiant Security Effectiveness Report 2020 explores cyber security performance across enterprise production environments and reveals how well organizations are protecting themselves against cyber threats.

Download the report to learn:

  • Why a majority of tested attacks successfully infiltrate enterprise environments without detection
  • The fundamentals of security validation and why it's so critical
  • How to improve the effectiveness of security controls


Whitepaper: Automate Testing Using MITRE ATT&CK® with Verodin Security Validation

by MandiantMay 15, 2020

Organizations are increasingly adopting MITRE ATT&CK® as a foundational element to their security programs. The Automate Testing Using MITRE ATT&CK® with Verodin paper provides organizations with a clear understanding of how security validation technology enables organizations to automate their ATT&CK-based effectiveness programs to optimize their defenses.

The white paper covers:

  • The challenges of ATT&CK tactical implementation
  • Emulation vs simulation
  • Behavioral testing


Research Report: SANS 2020 Top New Attacks and Threat Report

by MandiantMay 15, 2020

In this paper, SANS Director of Emerging Security Trends John Pescatore highlights key themes from analysis of new attack techniques presented by SANS at the RSA 2020 Conference.

The paper includes:

  • An overview of the top new attacks and threats
  • Insight into overall cybersecurity trends on both the offensive and defensive sides
  • Advice on the steps enterprises must take to evolve critical skills, processes and controls to mitigate current and future risks


E-Book: Case Study: Continuously Validate Cybersecurity Controls

by MandiantMay 15, 2020

Are you able to get evidence-based data to show progress and improvements in your cybersecurity strategy?

Read this case study to understand how Mandiant Security Validation (formerly Verodin), empowers leading financial services organization Torchmark Corporation to continuously validate cybersecurity controls and realize improvements in key areas such as:

  • People and process conditioning
  • Communicating the effectiveness of security controls
  • Real-time insights into environmental drift detection


E-Book: CyberSecurity Trends 2020

by MandiantMay 15, 2020

Without ongoing validation that security solutions are working as promised, businesses can be caught off-guard when an attempted hack is successful, and the financial impact and cost to brand reputation can be highly disruptive and long-lasting.

Read the Verodin Cybersecurity Trends 2020 eBook, to understand the four key trends that will shape how users and vendors of security technology approach the evolving threat landscape.