APT

IPS grows up

IPS grows up

By

The intrusion prevention system is a mainstay of any organization's perimeter-focused security infrastructure, but its days may be numbered as a standalone technology. Yet, its purpose lives on.

Video: Targeted Attacks

By

It's one thing to be a victim of a phishing campaign, but it's an entirely different ball game when you're at the receiving end of a targeted attack.

APTs

APTs

Exposing and defeating cyber criminal campaigns out for financial gain or trade secrets is the challenge of the day, but there are strategies and tools available to help.

Fact or fiction: Dissecting the myths of advanced persistent threats

Fact or fiction: Dissecting the myths of advanced persistent threats

The term advanced persistent threat, or APT, has been flung around by vendors ad nauseam over the past several years. In a sense, given the sheer number of breaches, one can't blame them. But is what they're telling you, the buyer, truthful?

Botnets: The backdoor to the enterprise network

Botnets: The backdoor to the enterprise network

Compromising anywhere from a few thousand to well over a million systems, botnets are used by cyber criminals to take over computers and execute illegal and damaging activities.

Experts discover Mac OS X malware, "Sabpub," used as APT

By

A new trojan is targeting the same Java vulnerability that the Flashback malware took advantage of last week.

Debate: The attack du jour, APTs, are real threats.

By

The attack du jour, APTs, or advanced persistent threats, are real threats.

A closer look at two of today's top security threats

Hackers and computer criminals have shown an ongoing ability to stay one step ahead of the security professional, but there are strategies and tools to help thwart their efforts.

The not-so-advanced persistent threat

Hacker groups Anonymous and LulzSec have made a name for themselves by scanning large organizations until they find the one weak system ready to be exploited. You can prevent an attack.

The five new laws of anti-malware

The five new laws of anti-malware

Today, the best overall security solution includes technologies that can help you quickly respond to an inevitable attack.

Solving the hardest problems in enterprise data security

Companies targeted by APT will need to upgrade their defenses strategy to include multiple, integrated layers of extremely sensitive anomaly detection and mitigation.

APTs in critical infrastructure organizations

APTs in critical infrastructure organizations

Many managers of utilities companies don't understand or appreciate the value of IT security...at their, the facilities' and the community's peril.

Collection of information key to thwarting APT attacks

By

Intelligence-driven information security is the future of battling advanced persistent threats, according to a new report.

U.S. and EU partner for security response exercise

U.S. and EU partner for security response exercise

By

"Cyber Atlantic 2011" aimed to clarify how the two nations can best communicate about cyber incidents that occur on government systems or critical infrastructure.

Recent attacks cost Energy Department at least $2M

By

The attacks, which occurred at four department locations, were not described in detail, but were deemed "successful" for adversaries, according to the annual audit.

"Sophistication" and the downfall of security

By

Hiding the facts behind a cyberattack only stands to benefit the criminal.

McAfee fires back at Shady RAT criticism

By

McAfee has fired back at critics of its report on Operation Shady RAT, and said the CEO of rival anti-virus maker Kaspersky Lab, who called the report "alarmist," missed the whole point of the expose.

APTs: New term, old problem

APTs: New term, old problem

Let's forgo the APT hysteria long enough to make sure we're doing a good job on the fundamentals.

Is APT the new FUD?

Is APT the new FUD?

The term "APT" is now becoming synonymous with any form of cyberattack, distracting attention away from the real challenge.

Advanced threats: Assume the worst

Advanced threats: Assume the worst

By

In today's sophisticated malware and intrusion tactics, organizations should already assume they have been compromised. The key is readiness, says Larry Whiteside, CISO, Visiting Nurse Service of N.Y.

Sign up to our newsletters

POLL