You searched for advanced persistent threat/ | SC Media

Your search for advanced persistent threat/ returned 45 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Features remove

Your search for advanced persistent threat/ returned 45 results

Sort Results:

Relevant Recent
Reboot: A look back at the milestones of 2013
Features

A look back at the milestones of 2013

As this year-end issue demonstrates, the vibrancy of this industry is as bright as ever and the challenges only more acute. However, stellar professionals on all fronts are at the ready.
Not your parents' threatscape: APTs
Features

Not your parents’ threatscape: APTs

For those organizations at risk to a nation-state attack, preparation should come with the expectation of compromise, as well as knowledge that the damage can be mitigated.
2014 Women in IT Security
Features

2014 Women in IT Security: Stacey Halota

When she stepped into the job of vice president of information security and privacy at Graham Holdings Company in 2003, Stacey Halota had to carve out new territory because her position had never existed at the corporate level before.
Features

Dissecting an APT attack

Basic network hygiene and improved visibility can go a long way, as we might learn from the likes of Ashley Madison and Anthem. Danny Bradbury reports.
Higher calling: Case study
Features

Higher calling: Case study

A U.K. college provides its "digital natives" with a secure environment that can be accessed anywhere from any device. Greg Masters reports.
Hard target: The APT scenario
Features

Hard target: The APT scenario

Stealthy, targeted attacks are real -- as evidenced by operations such as Shady RAT and Stuxnet -- and there isn't a one-size-fits-all remedy to deal with them.
Breaking the next case
Features

Breaking the next case

Today's flurry of cybercrimes rely on an array of motivations, techniques and technologies, making the job of an investigator to track down the offender that much more difficult.
EXIT strategy: Insider threat
Features

EXIT strategy: Insider threat

Threats from inside an organization - and from third-parties - pose a burgeoning challenge for security professionals, reports Jim Romeo.
Next post in Features