The Cybersecurity Company Helping Sony Fend Off Hackers

FireEye-logo.png

In late November, Sony Pictures found its planned release of the Seth Rogen comedy The Interview turning into a disaster of cinematic proportions. Hackers had seized control of the studio's computer systems, leaking troves of sensitive information, including executive salaries and embarrassing emails. The studio canceled and then reinstated the film's theatrical release, costing Sony an estimated $15 million.
It was one of the best things to happen last year to FireEye
Though not a household name, the Milpitas, California-based Company has become a go-to security firm when big companies fall victim to cyberattacks. FireEye customers include recent cyber victims like Home Depot, JPMorgan Chase, Neiman Marcus, and Target; the CIA and the FBI have called the firm in for help with investigations. So when Sony's Los Angeles security team realized the studio's network had been breached, they asked FireEye to help figure out exactly what had happened and where the systems were vulnerable. That's the first step for many FireEye clients, most of which then ask the company to repair and improve their data defenses.
"We were founded on the idea that cyber­attacks would ultimately overrun all existing defenses. Now this has been overwhelmingly demonstrated," says Ashar Aziz, the company's founder, chief strategy officer, and vice chairman. 
FireEye developed its reputation by commercializing a security technique that creates a mirror image of a company's systems to assess the online threats it is facing. It's one of a new breed of startups benefiting from what is a growing, if dismaying, feature of 21st-century commerce: relentless hack attacks. Last year alone saw one billion files hit by 1,540 data breaches--a 46 percent increase in the number of attacks from 2013, according to security firm Gemalto.
There is still a lot of room for grow: FireEye, which went public in 2013, controls a small fraction of the roughly $9 billion global market for network security, according to research firm IDC. But despite increasing demand for its services, the company has yet to turn a profit, and lost $443.8 million last year.
Technology analysts tend to shrug off such losses at young security companies, which need to hire expensive engineers and ramp up their marketing spending as business grows. FireEye plans to continue running at a loss this year, which Aziz argues is a smart strategy given the mounting demands for its services in the current cyber environment. "The threat actors have not gone away through all of this," Aziz says. "They have only gotten bigger and better." And what's bad news for pretty much anyone else is excellent news for those in the business of fighting such cyber villains.
Inc.com:  http://bit.ly/1HQ04Kg

 

« Who’s Afraid Of Superhumanity?
Financial Institutions Face Increasing Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CCN-CERT

CCN-CERT

CCN-CERT is the Spanish national government computer security incident response centre.

National Response Centre for Cyber Crime (NR3C)

National Response Centre for Cyber Crime (NR3C)

National Response Centre for Cyber Crime (NR3C) is a law enforcement agency in Pakistan dedicated to fighting cyber crime.

SEWORKS

SEWORKS

SEWORKS provides offensive and defensive app security that ensures mobile and web apps are safe from dangerous hacking threats.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

SoSafe

SoSafe

SoSafe empowers organizations to build a security culture and mitigate risk with its GDPR-compliant awareness programs.

Council of Europe Convention on Cybercrime

Council of Europe Convention on Cybercrime

The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime.

Samurai Digital Consulting

Samurai Digital Consulting

Samurai Digital Security are a cyber and Information security services provider, specialising in penetration testing, incident response, user awareness and information governance solutions.

Tabidus Technology

Tabidus Technology

Tabidus Technology is a cybersecurity association that unites and provides the global protection options against cyber threats.

East Midlands Cyber Resilience Centre (EMCRC)

East Midlands Cyber Resilience Centre (EMCRC)

The East Midlands Cyber Resilience Centre is set up to support and help protect businesses across the region against cyber crime.

Raman Power Technologies

Raman Power Technologies

Raman Power Technologies focus on bringing value and solving business challenges through the delivery of modern IT services and solutions including cybersecurity.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.

Redefine

Redefine

Redefine are Crypto-Native, Cyber Experts, and Blockchain Believers. We are here to make Web3 anti-fragile, safe and accessible to all.

Techtron Business IT Services

Techtron Business IT Services

TECHTRON has been providing business IT services since 2004. Our focus is on SMBs and we are good at it. Our customers trust us, they love our high levels of service, and they love what we stand for.

Velstadt Cybersecurity

Velstadt Cybersecurity

Velstadt's team of experienced professionals works on identifying vulnerabilities, analyzing threats, and developing strategies to ensure the highest level of security.

Anthropic

Anthropic

Anthropic is a Public Benefit Corporation, whose purpose is the responsible development and maintenance of advanced AI for the long-term benefit of humanity.