The Ultimate Guide to Advanced Persistent Threat Protection
2024 edition
Overview
Most associated with industrial or political espionage (between opposing nations) Advanced Persistent Threats are characterized by stealth, persistence (the bad actor doesn’t let up), and a high degree of sophistication. A famous example is the Stuxnet attack targeting the Iranian nuclear program. Advanced Persistent Threat Protection is the specialised cybersecurity branch seeking to identify, prevent or mitigate these types of attack.
Analyst reports
IDC MarketScape on SIEM
Rapid7 named leader in 2024 IDC report for SIEM SMB sec...
Last week
Frost & Sullivan on SOC
Check Point to acquire Cyberint, enhancing SOC capabili...
Last month
IDC on Ransomware
Ransomware attacks soar 63% in US, 67% in UK, says repo...
Last month
Gartner on Data Protection
Commvault named leader in 2024 Gartner Magic Quadrant
Last month
Gartner on Enterprise security
SentinelOne unveils AI-driven innovations for Singulari...
Last month
Expert columns
By Innes Muir of Logpoint
How MDR will transform cybersecurity in the mid-market
Yesterday
By Scott Mann of Check Point Software Technologies
Scam Awareness Week: An opportunity to check your attac...
Last month
By Devasmita Das of ColorTokens
Beyond prevention: Why breach readiness is your cyberse...
Last month
By Talent International
The impact of digital transformation on the financial s...
Last month
By Dave Gerry of Bugcrowd
Pen testing must evolve to keep pace with telco threats
Last month
Interviews
Discussing Government
Exclusive: Entrust discusses future of digital identity...
Last month
Discussing Cloud Services
Exclusive: Cohesity reveals three pillars driving its s...
Mon, 29th Jul 2024
Discussing Managed Services
Exclusive: How SonicWall is staying ahead of cyber thre...
Fri, 24th May 2024
Discussing Data Protection
Exclusive: How Entrust is protecting digital identities
Wed, 15th May 2024
Discussing Passwords
Exclusive: Insights from Yubico on World Password Day
Wed, 1st May 2024
More expert columns
By Scott Kramer of Clio
How government support can bolster business cybersecuri...
Last month
By Selena Larson and Joe Wise of Proofpoint
Threat actor abuses Cloudflare tunnels to deliver RATs
Last month
By Matt Caffrey of Barracuda
Protecting against the cost and impact of cyber crime
Wed, 31st Jul 2024
By Martin Creighan of Commvault
Immutability is the cornerstone of a safe enterprise
Mon, 29th Jul 2024
By Eva Abergel of Radware
How to neutralise a web DDoS tsunami attack
Fri, 19th Jul 2024
By Raj Samani of Rapid7
Defending against APTs: A learning exercise with Kimsuk...
Wed, 17th Jul 2024
Top players
You can read more from the top players Recogni, Proofpoint, Google Cloud, CrowdStrike, and Commvault.
Recent news
About Digital Transformation
Tecala joins Netskope MSP Program for enhanced cloud se...
Yesterday
About Data Protection
Cohesity & CrowdStrike expand partnership for advanced ...
Yesterday
About Digital Transformation
Australia's Privacy Act reforms: Business impact detail...
Last week
About Threat detection
Report: genAI rapidly advancing in cybersecurity operat...
Last week
About Business Continuity
Hibbett enhances security with Cequence API protection ...
Last week
More news
About Malware
AI-driven cybercrime spikes in Australia & NZ, warns Tr...
Last week
About Law
Australian law firms ill-equipped for rising cyber thre...
Last week
About Hyperscale
Zscaler launches new co-located data centre in Perth
Last week
About Ransomware
Trustwave highlights critical cyber threats to financia...
Last week
About Ransomware
Proofpoint & CyberArk expand partnership for enhanced s...
Last week
Even more news
About Social Media
Proofpoint unveils new security features
Last week
About DevOps
Check Point's CloudGuard named Leader in GigaOm Securit...
Last week
About DevOps
CAST AI launches real-time Kubernetes security solution
Last week
About Cyber Threats
Breached firms invest 30% more in cyber resilience says...
Last week
About Malware
Sophos unveils Chinese cyber espionage tactics in new r...
Last week
Job moves
Move at Cisco
Check Point Software appoints Ruma Balasubramanian as A...
This month
Move at Claroty
Claroty names Nick Haan as new Field CTO for Strategic ...
Last month
Move at Proofpoint
Proofpoint appoints Nelson Soon to VP role in Asia Paci...
Last month
Move at Amazon Web Services
AppOmni appoints Joel Wallenstrom as new General Manage...
Last month
Move at Bitdefender
WithSecure appoints Samantha Cotton as UK & Ireland cha...
Last month
Other guides
You can read other related guides from Cybersecurity, Artificial Intelligence, Breach Prevention, Risk & Compliance, and Ransomware.
Powered by