Your search for advanced persistent threats returned 35 results.

Sort results:

Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.

Webcast

An Enterprise Security Platform Approach to Advanced Persistent Threats

Today's advanced persistent threats (APTs) evade traditional security controls with techniques such as SSL encryption and require an integrated, simple and automated approach that can detect and defend at each stage of an attack.

Document The Game is On: Advanced Persistent Threats

The Game is On: Advanced Persistent Threats

APTs give IT teams headaches, because they are extremely stealthy in nature and are almost always aimed at a very specific target. On the other hand, they are designed to remain in the network undetected for extended periods of time, all the while stealing sensitive company data.

News Advanced Persistent Threats not so advanced anymore, researchers find

Advanced Persistent Threats not so advanced anymore, researchers find

Attackers no longer need specialized skills to carry out what is considered an Advanced Persistent Threat, according to researchers with Imperva.

Webcast

Strategies that work for Advanced Persistent Threat Prevention

Advanced Persistent Threats (APTs) are being used to compromise organizations around the globe with increasing sophistication, persistence, and evasive attack methods.

News

Lack of resources exposes organizations to APTs, study finds

A lack of budget and resources is opening up enterprises to advanced persistent threats, according to a recent study by the Ponemon Institute.

News

RSA 2014: Sharing data key to beating APTs

Collaborative sharing of security data across enterprises, countries and industry sectors in a single big data store will be the future of protecting against advanced persistent threats, RSA delegates were told today.

Brief

Advanced threat report names Great Britain, Switzerland as most targeted in Europe

Great Britain, Germany, France and Switzerland accounted for more than 70 percent of unique infections in 2013.

Feature A look back at the milestones of 2013

A look back at the milestones of 2013

As this year-end issue demonstrates, the vibrancy of this industry is as bright as ever and the challenges only more acute. However, stellar professionals on all fronts are at the ready.

News Study: AV, anti-malware most used controls for APT defense

Study: AV, anti-malware most used controls for APT defense

Ninety-six percent of security pros employed AV and anti-malware solutions to protect data from APT attacks, while protections for mobile entry points fell at the bottom of the list.

News

Survey: 53 percent change privileged logins quarterly

A Lieberman Software survey highlights the issue or poor password management, even among security pros.

Webcast

Fighting APTs

With simple viruses and Trojans were all the rage, life was simpler for the average CSO. Now, threats of all types abound and the methods cyber attackers enlist to infiltrate networks have only become more varied, often a bit more sophisticated and most assuredly more frequent. One of the...

News Advanced Evasion Techniques still top of mind for pros, study says

Advanced Evasion Techniques still top of mind for pros, study says

Nearly 40 percent of IT decision-makers don't believe they have the ability to detect AETs, which fly under the radar of most firewalls.

News

Study: Uneasiness concerning insider threats grows for security professionals

Preventing insider threats has become increasingly more difficult since 2011, according to the new survey.

Opinion Know your traffic: The case for egress monitoring and filtering

Know your traffic: The case for egress monitoring and filtering

Our networks are our field; no one knows our network better than us, the people who maintain it. We need to use that to our advantage.

Blog Post Nawaf Bitar, senior VP and GM, security business unit, Juniper Networks

Nawaf Bitar, senior VP and GM, security business unit, Juniper Networks

Nawaf Bitar, keynote speaker at this year's RSA Conference in San Francisco, gives us a brief preview of his presentation, as well as some topics he believes will be heavily covered this year.

Blog Post Defending against APTs: Looking for the big picture

Defending against APTs: Looking for the big picture

The most significant reason that threats go undetected can be summarized in two words: insufficient data.

Opinion Leveraging threat intelligence to stay one step ahead

Leveraging threat intelligence to stay one step ahead

To overcome a plethora of challenges, cyber defenders must create innovative new models for protecting their organizations from increasingly advanced threats.

Webcast

Unlocking the conundrum of advanced evasion techniques (AETs)

As various industry organizations, such as the Community Emergency Response Team (CERT) in Finland, work with numerous IT security vendors and other experts to figure out the countless vulnerabilities that can allow advanced evasion techniques (AETs) to sneak through networks, organizations plagued by AETs are facing their own, more...

News Chinese hackers breach 50 U.S. gov't contractors' systems in one year

Chinese hackers breach 50 U.S. gov't contractors' systems in one year

A new report from the U.S. Senate Armed Services Committee found that multiple successful attempts were made to access and steal information from contractors' systems, and often times, the government didn't know it happened.

Product Review Invincea Platform v3.3/4.0

Invincea Platform v3.3/4.0

Invincea provides an additional layer of security at the endpoint by adding in protection for web browsing and document use.

Page 1 of 2

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US