The Ultimate Guide to Advanced Persistent Threat Protection
2024 edition
Overview
Most associated with industrial or political espionage (between opposing nations) Advanced Persistent Threats are characterized by stealth, persistence (the bad actor doesn’t let up), and a high degree of sophistication. A famous example is the Stuxnet attack targeting the Iranian nuclear program. Advanced Persistent Threat Protection is the specialised cybersecurity branch seeking to identify, prevent or mitigate these types of attack.
Analyst reports
Gartner on Malware
Check Point Software named Visionary in 2024 Gartner re...
Last month
Forrester Wave on Firewalls
Palo Alto Networks leads attack surface management in F...
Last month
Gartner on Storage
Pure Storage named leader in Gartner Magic Quadrant 202...
Last month
Frost & Sullivan on Firewalls
Check Point Software hailed as leader in email security...
Last month
Osterman Research on Phishing
Report: 80% of critical infrastructure hit by email bre...
Last month
Featured news
About Ransomware
Exclusive: Mandiant Consulting highlights evolving cybe...
Last week
About Cyber Threats
Exclusive: Claroty highlights risks and solutions for c...
Last week
About Storage
Exclusive: Wasabi's Rob Waite discusses growth, cloud s...
Last month
About Social Media
Exclusive: Yubico finds majority still using outdated m...
Last month
About Government
Exclusive: Entrust discusses future of digital identity...
Tue, 20th Aug 2024
About Cloud Services
Exclusive: Cohesity reveals three pillars driving its s...
Mon, 29th Jul 2024
Expert columns
By Fabio Fratucello of CrowdStrike
Why legacy SIEM tools have failed security teams
3 days ago
By Matthew Salier of Australian Cyber Collaboration Centre
How we can help younger Australians tackle cybersecurit...
4 days ago
By Mark Bowling of ExtraHop
Visibility is vital for detecting ransomware attacks
Last week
By Mark Knowles of Xero
Four tips to protect your business from cybercriminals
Last month
By Adrian Covich of Proofpoint
What cyber lessons can be learned from the Paris Olympi...
Last month
Interviews
Discussing Ransomware
Exclusive: Mandiant Consulting highlights evolving cybe...
Last week
Discussing Cyber Threats
Exclusive: Claroty highlights risks and solutions for c...
Last week
Discussing Storage
Exclusive: Wasabi's Rob Waite discusses growth, cloud s...
Last month
Discussing Social Media
Exclusive: Yubico finds majority still using outdated m...
Last month
Discussing Government
Exclusive: Entrust discusses future of digital identity...
Tue, 20th Aug 2024
More expert columns
By Innes Muir of Logpoint
How MDR will transform cybersecurity in the mid-market
Last month
By Scott Mann of Check Point Software Technologies
Scam Awareness Week: An opportunity to check your attac...
Thu, 29th Aug 2024
By Devasmita Das of ColorTokens
Beyond prevention: Why breach readiness is your cyberse...
Mon, 19th Aug 2024
By Talent International
The impact of digital transformation on the financial s...
Fri, 16th Aug 2024
By Dave Gerry of Bugcrowd
Pen testing must evolve to keep pace with telco threats
Fri, 16th Aug 2024
By Scott Kramer of Clio
How government support can bolster business cybersecuri...
Wed, 14th Aug 2024
Top players
You can read more from the top players Google Cloud, Proofpoint, Claroty, Secureworks, and Commvault.
Recent news
About Scams
Symbio launches AI-based Scam Shield to tackle scam cal...
Yesterday
About Ransomware
ExtraHop unveils new file analysis features for RevealX
Yesterday
About Collaboration
US indictment reveals Anonymous Sudan's true motives
Yesterday
About Social Media
Identity theft affects 13% of Australians, says Norton
Yesterday
About Cyber Threats
Arctic Wolf report reveals IT security gaps in A/NZ reg...
Yesterday
More news
About Ransomware
Gap in cyber preparedness between Australia, UK, & US
Yesterday
About Software Updates
WatchGuard reveals Q2 2024 cyber threat trends report
Yesterday
About Unified Communications
Cequence Security reports impressive 117% revenue growt...
Yesterday
About Hacking
AI seen boosting hacking value by 71%, says Bugcrowd
Yesterday
About Firewalls
Cyber threats to 2024 US election identified by Fortine...
2 days ago
Even more news
About Malware
CISOs prioritise visibility into data-in-motion securit...
2 days ago
About Enterprise security
Developer upskilling crucial for Secure-by-Design succe...
2 days ago
About Malware
WatchGuard reveals new malware trends in Q2 2024 report
2 days ago
About Data Protection
Proofpoint achieves IRAP certification for email securi...
3 days ago
About Malware
BlackFog wins AI-based cybersecurity innovation award
4 days ago
Job moves
Move at Fuji Xerox
CrowdStrike appoints Louis Tague as ANZ Sales VP
Yesterday
Move at Qualys
Cequence Security appoints Randolph Barr as new CISO
2 days ago
Move at Cisco
Contrast Security appoints Faya Peng as ADR division GM
Last week
Move at Workday
Paul Henaghan joins Cohesity as new ANZ Managing Direct...
Last month
Move at Microsoft
Logpoint appoints Søren Grubov as SVP of Engineering
Last month
Other guides
You can read other related guides from Cybersecurity, Artificial Intelligence, HealthTech, Breach Prevention, and Risk & Compliance.
Powered by