The Ultimate Guide to Advanced Persistent Threat Protection
2024 edition
Overview
Most associated with industrial or political espionage (between opposing nations) Advanced Persistent Threats are characterized by stealth, persistence (the bad actor doesn’t let up), and a high degree of sophistication. A famous example is the Stuxnet attack targeting the Iranian nuclear program. Advanced Persistent Threat Protection is the specialised cybersecurity branch seeking to identify, prevent or mitigate these types of attack.
Analyst reports
ABI Research on Firewall
Cyber threats prompt UK industries to prioritise cybers...
Thu, 28th Mar 2024
IDC MarketScape on Ransomware
Canadian ISA Cybersecurity launches first UK operation ...
Thu, 28th Mar 2024
IDC MarketScape on Firewall
Sophos leads in IDC MarketScape's cybersecurity assessm...
Fri, 15th Mar 2024
IDC on Firewall
Ransomware peaks as top threat in ANZ as study highligh...
Tue, 12th Mar 2024
Miercom on Cybersecurity
Check Point's Infinity Platform crowned leading Zero Tr...
Mon, 11th Mar 2024
Featured news
About Passwords
Exclusive: Insights from Yubico on World Password Day
Last week
About Collaboration
Titans of Tech - Mike East of Cado Security
Last month
About Cloud Services
Exclusive: How Okta is fortifying digital identities
Wed, 13th Mar 2024
About Cyber Threats
Exclusive: Aura sheds insights on the state of cybersec...
Wed, 6th Mar 2024
About Cloud Services
Exclusive: Why Commvault's focused on cyber resilience
Wed, 6th Mar 2024
Expert columns
By COSBOA
We are making cyber security simple for Australian smal...
2 days ago
By Simon Howe of ExtraHop
There is no zero trust without network visibility
Last week
By Nathan Wenzler of Tenable
Customers vs banks - Where should the buck stop in prev...
Last month
By Adam Khan of Barracuda XDR
How attackers target security blind spots: Three real-l...
Last month
By Mark Gorrie of Gen Digital Inc
Watch out! There are hidden dangers lurking in your PDF...
Last month
More expert columns
By Mark Gorrie of Gen Digital Inc
One wrong click can devastate your small business: so w...
Last month
By Richard Sorosina of Qualys
Software supply chain security: Finding the weakest lin...
Last month
By Brett Chase of Cohesity
The imperative to go beyond backup, by focusing on cybe...
Thu, 28th Mar 2024
By George Moawad of Genetec
Cybersecurity risks of legacy access control systems
Mon, 25th Mar 2024
By Robin Long & Raj Samani of Rapid7
Why the external attack surface matters: An analysis in...
Fri, 22nd Mar 2024
By Ilan Rubin of Wavelink
The role of change management in cybersecurity awarenes...
Thu, 21st Mar 2024
Top players
Recent news
About Security Information and Event Management
Graylog unveils Security 6.0 for robust cyber threat de...
Yesterday
About Security vulnerabilities
ForAllSecure unveils AI-powered SBOM tool Mayhem to tar...
Yesterday
About Firewall
Zscaler report raises alarm over VPN vulnerabilities in...
Yesterday
About Machine learning
ExtraHop launches suite of AI tools on RevealX platform
Yesterday
About Threat intelligence
Dragos & CrowdStrike expand partnership to tackle cyber...
Yesterday
More expert columns
By Ilan Rubin of Wavelink
The role of change management in cybersecurity awarenes...
Thu, 21st Mar 2024
By Crystal Morin of Sysdig
Cloud-native security: Best practices vs. convenience a...
Wed, 20th Mar 2024
By George Moawad of Genetec
Ensuring security without compromising privacy
Mon, 18th Mar 2024
By Wayne Phillips of SentinelOne
From investment to impact: Unlocking cybersecurity valu...
Thu, 14th Mar 2024
By George Moawad of Genetec
A proactive approach to cyber and physical security
Wed, 13th Mar 2024
By Matt Caffrey of Barracuda Australia
Five ways AI is already strengthening cyber-defences
Tue, 12th Mar 2024
Video interviews
Discussing Threat detection
Video: 10 minute IT Jams - An update from Check Point S...
Fri, 18th Aug 2023
Discussing Cyber Criminal
Video: 10 Minute IT Jams - Another update from Mandiant
Fri, 18th Aug 2023
Discussing Management
Video: 10 Minute IT Jam - An update from Trustwave
Wed, 16th Aug 2023
Discussing Forensics
Video: 10 Minute IT Jams - An update from Cado Security
Thu, 13th Jul 2023
Even more expert columns
By Matt Caffrey of Barracuda Australia
Five ways AI is already strengthening cyber-defences
Tue, 12th Mar 2024
By Jessie Jamieson of Tenable
IWD 2024: Moving past quotas: Inclusivity & neurodivers...
Fri, 8th Mar 2024
By Leanne Salisbury of Adarma
IWD 2024: Forging the path – The inspirational stories ...
Fri, 8th Mar 2024
By Nathan Wenzler of Tenable
Decoding the Microsoft breach: Key lessons to bolster c...
Mon, 4th Mar 2024
By Matias Madou of Secure Code Warrior
The importance of cybersecurity training for software d...
Wed, 28th Feb 2024
By Stephen Bovis of Oracle ANZ
Innovation, AI and Australia and New Zealand’s digital ...
Tue, 13th Feb 2024
By Matt Caffrey of Barracuda Australia
Advanced security tools can help bridge the cyber-skill...
Mon, 5th Feb 2024
By Scott McKinnel of Tenable ANZ
Exposure management: a strategic ally in essential eigh...
Mon, 5th Feb 2024
By Marius Van Der Merwe of i-PRO
The transformational power of AI in security
Wed, 17th Jan 2024
By Ash Shatrieh of F-Secure
Small businesses targeted by cyber criminals for data
Thu, 21st Dec 2023
More news
About Network visibility
Dragos, CrowdStrike enhance OT cybersecurity amid risin...
Yesterday
About Cyber Threats
Guardz & SuperOps partner for enhanced AI-driven cybers...
Yesterday
About Cloud Services
Vectra AI expands platform to counter GenAI cyber threa...
2 days ago
About Accounting systems
Check Point report shows 154% rise in cloud security in...
2 days ago
About Transparency
Ververica boosts data security & transparency with new ...
2 days ago
Even more news
About Cyber Threats
Yubico bolsters security with YubiKey 5.7 firmware upda...
2 days ago
About iOS
Appdome unveils MobileEDR solution for improved enterpr...
Last week
About Cloud Services
Sophos & Infinigate unite for strategic distribution de...
Last week
About Cloud Security
Illumio partners with Wiz to bolster cloud security sol...
Last week
About Ransomware
Absolute Security to reveal next-gen cyber resilience a...
Last week
Job moves
Move at Trustwave
Trustwave appoints new SVP of engineering, Keith Ibargu...
3 days ago
Move at Vectra AI
Former Google Cloud VP Jeff Reed joins Vectra AI as Chi...
Last month
Move at Zscaler
Zscaler boosts ANZ presence with high-profile leadershi...
Last month
Move at Application Security
Major coup for Mindgard with new VP from cybersecurity ...
Fri, 1st Mar 2024
Move at Citadel
Earnix welcomes Daniel Shalom as new Chief Information ...
Fri, 23rd Feb 2024
Other guides
You can read other related guides from Cybersecurity, Artificial Intelligence, Breach Prevention, AI Security, and Partner Programmes.
Powered by