FireEye - Part 3. Collection of articles on how FireEye brought (or attempted to bring) botnets down

Previous part of FireEye deployment is here

I hope you will enjoy this part as I enjoyed reading through these articles - it sounds very similar to a spy stories how has infiltrated enemy front and contacts the command center. The only difference is, this spy (malware) is bad spy and the command center people are bad!

Let me point you to this article here. If you enjoyed this point, here is part 2. These come from FireEye themselves. I am passionated  with FireEye technology and I am not endorsing their technology because all technologies have their peak and plateau and I am not saying this is the best out there.

If this interested you, you should visit this 5 part series which got me hooked!

Killing the beast - Part 1

Killing the beast - Part 2

Killing the beast - Part 3

Killing the beast - Part 4

Killing the beast - Part 5

Personally, I envy these guys at FireEye - amazing experience.

Subsequent blog:

Part 4 : What are the downsides of FireEye

Previous parts:

Part 1: Why FireEye? How it works?

Part 2: FireEye deployment practice

One Response to “FireEye - Part 3. Collection of articles on how FireEye brought (or attempted to bring) botnets down”

  1. All about IT Governance » Blog Archive » FireEye - Part 4. Drawbacks of FireEye (current!) Says:

    [...] All about IT Governance Information Security - Can’t live with it, Can’t live without it! « FireEye - Part 3. Collection of articles on how FireEye brought (or attempted to bring) botnets down [...]

Leave a Reply

You must be logged in to post a comment.