The Ultimate Guide to Advanced Persistent Threat Protection
2024 edition
Overview
Most associated with industrial or political espionage (between opposing nations) Advanced Persistent Threats are characterized by stealth, persistence (the bad actor doesn’t let up), and a high degree of sophistication. A famous example is the Stuxnet attack targeting the Iranian nuclear program. Advanced Persistent Threat Protection is the specialised cybersecurity branch seeking to identify, prevent or mitigate these types of attack.
Analyst reports
Gartner on IT Training
The importance of cybersecurity training for software d...
Last month
Gartner on Firewall
Radware introduces cybersecurity model to boost MSSP re...
Last month
IDC on Cloud Services
Vectra AI & Gigamon partner for hybrid cloud security s...
Last month
IDC on Endpoint Protection
Vectra AI debuts global MXDR for hybrid attack defense
Last month
Gartner on Cloud Services
BeyondTrust reports substantial growth & ongoing innova...
Last month
Expert columns
By Stephen Bovis of Oracle ANZ
Innovation, AI and Australia and New Zealand’s digital ...
Last month
By Matt Caffrey of Barracuda Australia
Advanced security tools can help bridge the cyber-skill...
Last month
By Scott McKinnel of Tenable ANZ
Exposure management: a strategic ally in essential eigh...
Last month
By Marius Van Der Merwe of i-PRO
The transformational power of AI in security
Wed, 17th Jan 2024
By Ash Shatrieh of F-Secure
Small businesses targeted by cyber criminals for data
Thu, 21st Dec 2023
More expert columns
By Dr. Jessie Jamieson of Tenable
Australia's six cyber shields: Will data science be sev...
Mon, 4th Dec 2023
By Nicko van Someren of Absolute Software
The pressing need for self-healing apps and network res...
Thu, 30th Nov 2023
By Paul Crighton of Barracuda Networks
Festive season alert: Rising cybercrime threatens busin...
Wed, 29th Nov 2023
By Richard Sorosina of Qualys
Qualys on cybersecurity predictions for 2024
Thu, 23rd Nov 2023
By Anthony Daniel of WatchGuard Technologies
The increasing impact of Artificial Intelligence on cyb...
Mon, 13th Nov 2023
By Leonardo Hutabarat of LogRhythm
Why securing smart grids is vital to the growth of smar...
Thu, 26th Oct 2023
Top players
Recent news
About Cloud Services
Akamai extends its segmentation solution to hybrid clou...
Last month
About Malware
Trend Micro dismantles major ransomware group LockBit
Last month
About Cloud Services
NinjaOne & SentinelOne redefine endpoint protection wit...
Last month
About Malware
Mandiant uncovers intricate UNC5325 cyber attacks on Iv...
Last month
About Hackers
AI's double-edged sword in cybersecurity, says Techoped...
Last month
More expert columns
By Leonardo Hutabarat of LogRhythm
Why securing smart grids is vital to the growth of smar...
Thu, 26th Oct 2023
By Etuate Cocker of Fortinet
Is it wise to put all your security solutions in one cy...
Wed, 25th Oct 2023
By Chris Barton of Absolute Software
Now is the time for self-healing systems in healthcare
Wed, 25th Oct 2023
By Robin Long of Rapid7
Increase cyber effectiveness and innovation through ope...
Thu, 19th Oct 2023
By Michelle Tan of StarHub
Safeguarding your business from escalating DDoS attacks
Tue, 10th Oct 2023
By Chris Fisher of Vectra AI, APJ
Preventing security professionals from ‘quietly quittin...
Thu, 28th Sep 2023
Video interviews
Discussing Threat detection
Video: 10 minute IT Jams - An update from Check Point S...
Fri, 18th Aug 2023
Discussing Cyber Criminal
Video: 10 Minute IT Jams - Another update from Mandiant
Fri, 18th Aug 2023
Discussing Management
Video: 10 Minute IT Jam - An update from Trustwave
Wed, 16th Aug 2023
Discussing Forensics
Video: 10 Minute IT Jams - An update from Cado Security
Thu, 13th Jul 2023
Discussing Cyber Threats
Video: 10 Minute IT Jams - The latest update from Sonic...
Mon, 24th Apr 2023
Even more expert columns
By Chris Fisher of Vectra AI, APJ
Preventing security professionals from ‘quietly quittin...
Thu, 28th Sep 2023
By Rajeevan Kanagasabai of Ribbon Communications
Critical infrastructure: Beyond just cyber security
Wed, 27th Sep 2023
By Michael Woods of Nexon Asia Pacific
Maximising your MSP partnership: How to choose a certif...
Mon, 14th Aug 2023
By Mark Fioretto of UiPath
How automation will bolster cybersecurity in Australia
Wed, 2nd Aug 2023
By Apu Pavithran of Hexnode
Safeguarding critical Infrastructures from cyber threat...
Mon, 31st Jul 2023
By Craig Jones of Ontinue
Navigating the security operations center maze
Fri, 21st Jul 2023
By Karen Dooley of Secure by Design
Changing the way the MOD manages cyber resilience for t...
Tue, 11th Jul 2023
By Hayley Turner of Dragos
Five critical controls against an industrial cyber atta...
Fri, 7th Jul 2023
By James Tucker of Nexon Asia Pacific
Balancing technology and people for robust protection
Wed, 5th Jul 2023
By Igor Portugal
Why regulating AI could have serious ramifications
Tue, 4th Jul 2023
More news
About Product Management
SimSpace appoints Clint Sand as new Chief Product Offic...
Last month
About Security Operations Centre
Elasticito announces strategic partnership with e2e-ass...
Last month
About Bring Your Own Device
Jamf report highlights poor cyber hygiene in organisati...
Last month
About Ransomware
Coalition predicts 25% surge in cyber vulnerabilities f...
Last month
About Advanced Threat Analytics
ManageEngine unveils machine learning feature in Log360...
Last month
Even more news
About Malware
Barracuda report highlights rise of high-risk business ...
Last month
About Cyber Threats
Check Point unveils 2024 Security Report, highlighting ...
Last month
About Online Safety
Web threats in Singapore down 5.9%, says Kaspersky repo...
Last month
About Cloud Security Alliance
IT professionals feel ill-prepared for emerging threats
Last month
About Cyber Threats
UK govt's 'wait & see' approach to AI regulation sparks...
Last month
Job moves
Move at Citadel
Earnix welcomes Daniel Shalom as new Chief Information ...
Last month
Move at McAfee
BeyondTrust strengthens Asia Pacific expansion with key...
Last month
Move at Juniper Networks
Tina Stewart ascends as Chief Marketing Officer at Utim...
Last month
Move at Sophos
Sean Muirhead named Chief Product Officer at Logpoint
Last month
Move at Deloitte
Claroty appoints Derek Phillips as new Chief Revenue Of...
Last month
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Network Management, Firewall, and Network Security.
Powered by