Your search for advanced persistent threats returned 32 results.

Sort results:

Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.

Webcast

An Enterprise Security Platform Approach to Advanced Persistent Threats

Today's advanced persistent threats (APTs) evade traditional security controls with techniques such as SSL encryption and require an integrated, simple and automated approach that can detect and defend at each stage of an attack.

Document The Game is On: Advanced Persistent Threats

The Game is On: Advanced Persistent Threats

APTs give IT teams headaches, because they are extremely stealthy in nature and are almost always aimed at a very specific target. On the other hand, they are designed to remain in the network undetected for extended periods of time, all the while stealing sensitive company data.

News Advanced Persistent Threats not so advanced anymore, researchers find

Advanced Persistent Threats not so advanced anymore, researchers find

Attackers no longer need specialized skills to carry out what is considered an Advanced Persistent Threat, according to researchers with Imperva.

Webcast

Strategies that work for Advanced Persistent Threat Prevention

Advanced Persistent Threats (APTs) are being used to compromise organizations around the globe with increasing sophistication, persistence, and evasive attack methods.

News Survey: real-time SIEM solutions help orgs detect attacks within minutes

Survey: real-time SIEM solutions help orgs detect attacks within minutes

Real-time security information and event management solutions help organizations detect targeted attacks and advanced persistent threats within minutes, according to a McAfee survey.

Webcast

Best practices for removing admin rights: A step-by-step approach

Careful control of administrator rights in the very foundation of IT Security. Allowing admin rights exposes a dangerous security risk, creating an easy entry point for advanced persistent threats, zero-day attacks and sophisticated malware.

Brief

Advanced threat report names Great Britain, Switzerland as most targeted in Europe

Great Britain, Germany, France and Switzerland accounted for more than 70 percent of unique infections in 2013.

Opinion Is your organization prepared for targeted cyber attacks?

Is your organization prepared for targeted cyber attacks?

Hackers are finding new attack vectors to exploit and it is becoming harder for us "security professionals" to defend our organizations, says Zouhair Guelzim, CISO, L'Oréal Americas.

News Study: Majority of enterprises breached in first half of 2014, regardless of vertical

Study: Majority of enterprises breached in first half of 2014, regardless of vertical

FireEye found that a majority of enterprises had their systems breached during the first half of 2014, and often times, advanced malware allowed for the intrusion.

News Study: AV, anti-malware most used controls for APT defense

Study: AV, anti-malware most used controls for APT defense

Ninety-six percent of security pros employed AV and anti-malware solutions to protect data from APT attacks, while protections for mobile entry points fell at the bottom of the list.

News

Survey: 53 percent change privileged logins quarterly

A Lieberman Software survey highlights the issue or poor password management, even among security pros.

News Advanced Evasion Techniques still top of mind for pros, study says

Advanced Evasion Techniques still top of mind for pros, study says

Nearly 40 percent of IT decision-makers don't believe they have the ability to detect AETs, which fly under the radar of most firewalls.

Opinion Rethink your cybersecurity strategy

Rethink your cybersecurity strategy

Even the most sophisticated, well-intentioned perimeter-focused cybersecurity strategy cannot possibly be 100 percent effective, says Oliver Tavakoli, CTO, Vectra.

Opinion Know your traffic: The case for egress monitoring and filtering

Know your traffic: The case for egress monitoring and filtering

Our networks are our field; no one knows our network better than us, the people who maintain it. We need to use that to our advantage.

Opinion Leveraging threat intelligence to stay one step ahead

Leveraging threat intelligence to stay one step ahead

To overcome a plethora of challenges, cyber defenders must create innovative new models for protecting their organizations from increasingly advanced threats.

Opinion Next-generation malware: Think like the enemy and avoid the car alarm problem

Next-generation malware: Think like the enemy and avoid the car alarm problem

When it comes to enterprise security, one rule remains constant - attacks will continue to increase in sophistication and attackers will seek to outmaneuver existing defenses.

Opinion Beware of the malware walking dead

Beware of the malware walking dead

This Hallows Eve might be a good time to remind ourselves that zombies can be just as deadly, and I'm referring to recycled tools and techniques from years gone by.

Webcast

Unlocking the conundrum of advanced evasion techniques (AETs)

As various industry organizations, such as the Community Emergency Response Team (CERT) in Finland, work with numerous IT security vendors and other experts to figure out the countless vulnerabilities that can allow advanced evasion techniques (AETs) to sneak through networks, organizations plagued by AETs are facing their own, more...

News Chinese hackers breach 50 U.S. gov't contractors' systems in one year

Chinese hackers breach 50 U.S. gov't contractors' systems in one year

A new report from the U.S. Senate Armed Services Committee found that multiple successful attempts were made to access and steal information from contractors' systems, and often times, the government didn't know it happened.

Group Test

Emerging products: Threat intelligence

Having the right products to provide solid intelligence analysis can go a long way toward protecting you against the ravages of a Sony-style compromise, says Peter Stephenson.

Page 1 of 2

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US