Attend RSA and Censys events designed for CISOs, Threat Hunters, and Security Practitioners| Save your spot!

Case Study

How FireEye Uses Censys to Fight Adversaries

In this case study, you’ll learn how the FireEye team uses Censys to:

  • Analyze data attributes that they can use to tie together sets of adversary infrastructure used for malware and phishing campaigns
  • Track adversaries based on their behavior and malware trends
  • Discover new suspicious and fraudulent assets that were likely created by attackers
  • Get a handle on attacker attribution, particularly when fighting nation-state attackers

Free Download