Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Your search for advanced persistent threats returned 35 results.Sort results:
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
Today's advanced persistent threats (APTs) evade traditional security controls with techniques such as SSL encryption and require an integrated, simple and automated approach that can detect and defend at each stage of an attack.
APTs give IT teams headaches, because they are extremely stealthy in nature and are almost always aimed at a very specific target. On the other hand, they are designed to remain in the network undetected for extended periods of time, all the while stealing sensitive company data.
Attackers no longer need specialized skills to carry out what is considered an Advanced Persistent Threat, according to researchers with Imperva.
Advanced Persistent Threats (APTs) are being used to compromise organizations around the globe with increasing sophistication, persistence, and evasive attack methods.
A lack of budget and resources is opening up enterprises to advanced persistent threats, according to a recent study by the Ponemon Institute.
Collaborative sharing of security data across enterprises, countries and industry sectors in a single big data store will be the future of protecting against advanced persistent threats, RSA delegates were told today.
Great Britain, Germany, France and Switzerland accounted for more than 70 percent of unique infections in 2013.
As this year-end issue demonstrates, the vibrancy of this industry is as bright as ever and the challenges only more acute. However, stellar professionals on all fronts are at the ready.
Ninety-six percent of security pros employed AV and anti-malware solutions to protect data from APT attacks, while protections for mobile entry points fell at the bottom of the list.
A Lieberman Software survey highlights the issue or poor password management, even among security pros.
With simple viruses and Trojans were all the rage, life was simpler for the average CSO. Now, threats of all types abound and the methods cyber attackers enlist to infiltrate networks have only become more varied, often a bit more sophisticated and most assuredly more frequent. One of the...
Nearly 40 percent of IT decision-makers don't believe they have the ability to detect AETs, which fly under the radar of most firewalls.
Preventing insider threats has become increasingly more difficult since 2011, according to the new survey.
Our networks are our field; no one knows our network better than us, the people who maintain it. We need to use that to our advantage.
Nawaf Bitar, keynote speaker at this year's RSA Conference in San Francisco, gives us a brief preview of his presentation, as well as some topics he believes will be heavily covered this year.
The most significant reason that threats go undetected can be summarized in two words: insufficient data.
To overcome a plethora of challenges, cyber defenders must create innovative new models for protecting their organizations from increasingly advanced threats.
As various industry organizations, such as the Community Emergency Response Team (CERT) in Finland, work with numerous IT security vendors and other experts to figure out the countless vulnerabilities that can allow advanced evasion techniques (AETs) to sneak through networks, organizations plagued by AETs are facing their own, more...
A new report from the U.S. Senate Armed Services Committee found that multiple successful attempts were made to access and steal information from contractors' systems, and often times, the government didn't know it happened.
Invincea provides an additional layer of security at the endpoint by adding in protection for web browsing and document use.