When you understand that you can't stop all attacks, but you can detect and remediate them before they do serious harm, the value proposition of Mandiant becomes apparent.
Security is one of the great market segments of the technology world as it's not typically driven by seasonality or cyclical demands. Security needs are constant and evolving. Simply put, no enterprise on the planet can afford not to invest continuously in security—for fear of being attacked and embarrassed in a public breach.
An elite unit of Chinese hackers that allegedly waged a massive cyber-espionage campaign against U.S. companies has attempted to clean up their online presence after being identified in a public report by information security firm Mandiant.
Hackers have embedded viruses into a security report which linked the Chinese army to cyberattacks on U.S. companies, infecting computers that download digital versions of the 60-page report.
When downloaded, the tainted versions would allow hackers to remotely control infected computers after users attempted to read the report which was released last week by U.S. IT security vendor, Mandiant.
Maybe it wasn’t China. Maybe it was, but suppose it wasn’t. That’s the reaction of at least one computer security consultant to yesterday’s blockbuster report from the security firm Mandiant, which accused a unit of China’s People’s Liberation Army of carrying out a series of hacking attacks against companies in the U.S., Canada, the U.K. and elsewhere over a series of years.
Jeffrey Carr, CEO of Taia Global, writes today in a blog post that he thinks Mandiant’s report is full of holes.
A private technology security firm on Tuesday described in extraordinary detail efforts it blamed on a Chinese military unit to hack into 141 businesses, mostly inside the U.S., and steal commercial secrets. China denies the claim. Here's a look at the company, Mandiant, and why its report is significant.
What is Mandiant?