You searched for advanced persistent threat/ | SC Media

Your search for advanced persistent threat/ returned 33 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Events remove

Your search for advanced persistent threat/ returned 33 results

Sort Results:

Relevant Recent
WebCast

Uncovering advanced persistent threats

Join us for a step-by-step walk through of how the Operation Cloud Hopper attack unfolded and how security professionals can implement automated defenses to detect malicious behavior like APT10's attack before the breach occurs.
Vendor Webcasts

A pragmatic approach to Advanced Persistent Threat (APT) Protection

Targeted attacks, or APTs, can be complex and affect organizations of all sizes, across all industries. But that doesn't mean their detection and prevention has to be complex too. With constant confusion around ATAs and APTs, a staggering 68% of IT Managers admit they don't know what an APT is.
SC Congress Canada

Understanding and mitigating against the advanced persistant threat (APT)

Ask industry players to define APT and you'll likely get several views. Add to this still-lingering marketing hype bolstering solutions' capabilities to directly address APTs and the resulting confusion that abounds among many security practioners is quite understandable. So, how do these attacks differ from others infiltrating your networks? What are the goals of those spearheading these types of attacks, and how do their methods differ from more traditional infrastructure assaults? This session explores these questions and provides some strategies to defend against these.
State of the Hack - Addressing the Advanced Persistent Threat
Vendor Webcasts

State of the Hack – Addressing the Advanced Persistent Threat

The Advanced Persistent Threat (APT) is a sophisticated and organized cyber attack to access and steal information from compromised computers. The intruders responsible for the APT attacks target the Defense Industrial Base, financial industry, manufacturing industry, and research industry. The attacks used by the APT intruders are not very different from any other intruder. The main differentiator is the APT intruder's perseverance and resources. They have malicious code (malware) that circumvents common safeguards such as anti-virus, and they escalate their tools and techniques as a victim's capability to respond improves. MANDIANT will discuss how they assist organizations in addressing the APT.
2014 SC Awards U.S. Finalists: Round One
2014 SC Awards US Finalists

2014 SC Awards U.S. Finalists: Round One

Round one of the 2014 SC Awards U.S. finalists includes categories for best advanced persistent threat protection, mobile security solution, vulnerability management solution, and the Excellence Award for best SME security solution.
2015 SC Awards U.S. Finalists: Round One
2015 SC Awards US Finalists

2015 SC Awards U.S. Finalists: Round One

Round one of the 2015 SC Awards U.S. finalists includes categories for best advanced persistent threat protection, mobile security solution, vulnerability management solution, and the Excellence Award for best SME security solution.
Next post in 2015 SC Awards US Finalists