You searched for advanced persistent threat/ | SC Media

Your search for advanced persistent threat/ returned 344 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Older than 2 years remove

Your search for advanced persistent threat/ returned 344 results

Sort Results:

Relevant Recent
The Game is On: Advanced Persistent Threats
Research

The Game is On: Advanced Persistent Threats

APTs give IT teams headaches, because they are extremely stealthy in nature and are almost always aimed at a very specific target. On the other hand, they are designed to remain in the network undetected for extended periods of time, all the while stealing sensitive company data.
WebCast

Advanced persistent threats

This SC Virtual Conference will address the actions to take when a well-entrenched breach is identified, how to eradicate it, and how to follow the threads to find out how deeply this attack went into your network.
WebCast

Advanced persistent threats

This eSymposium will look at approaches companies can take to find those attackers who already have ferreted in to your network and are slowly draining valuable corporate data.
WebCast

Advanced persistent threats

What's occurring on the network while the IT team is trying to recover from a malware breach? Chances are, that malware breach is just a clever diversion.
WebCast

Advanced Persistent threats

Some companies are getting a handle on these elite attackers and their methods. We look to them to help us better equip other security teams to address this plague.
Advanced persistent threat
Research

Advanced persistent threat

In the old days, a cyberthief would play a numbers game, sending out millions of emails with a compromised link, for example, with the hope that one percent of recipients would respond. Nowadays, in an advanced persistent threat (APT) attack - such as recent, high-profile incursions Stuxnet and Operation Shady RAT - the perpetrator spends a considerable amount of time researching a specific target, often customizing malware so that its signature cannot be identified by any existing anti-virus or anti-malware software. Too, these attackers have significant resources, both financially and technologically, and motivation that might not have anything to do with pure financial gain. The good news: there are resources available for companies to combat APTs.
Next post in Research