The Ultimate Guide to Advanced Persistent Threat Protection
2024 edition
Overview
Most associated with industrial or political espionage (between opposing nations) Advanced Persistent Threats are characterized by stealth, persistence (the bad actor doesn’t let up), and a high degree of sophistication. A famous example is the Stuxnet attack targeting the Iranian nuclear program. Advanced Persistent Threat Protection is the specialised cybersecurity branch seeking to identify, prevent or mitigate these types of attack.
Analyst reports
ABI Research on Firewall
Cyber threats prompt UK industries to prioritise cybers...
Last month
IDC MarketScape on Ransomware
Canadian ISA Cybersecurity launches first UK operation ...
Last month
IDC MarketScape on Firewall
Sophos leads in IDC MarketScape's cybersecurity assessm...
Last month
IDC on Firewall
Ransomware peaks as top threat in ANZ as study highligh...
Last month
Miercom on Cybersecurity
Check Point's Infinity Platform crowned leading Zero Tr...
Last month
Featured news
About Collaboration
Titans of Tech - Mike East of Cado Security
Last week
About Cloud Services
Exclusive: How Okta is fortifying digital identities
Last month
About Cyber Threats
Exclusive: Aura sheds insights on the state of cybersec...
Last month
About Cloud Services
Exclusive: Why Commvault's focused on cyber resilience
Last month
Expert columns
By Mark Gorrie of Gen Digital Inc
Watch out! There are hidden dangers lurking in your PDF...
Last week
By Mark Gorrie of Gen Digital Inc
One wrong click can devastate your small business: so w...
Last week
By Richard Sorosina of Qualys
Software supply chain security: Finding the weakest lin...
Last week
By Brett Chase of Cohesity
The imperative to go beyond backup, by focusing on cybe...
Last month
By George Moawad of Genetec
Cybersecurity risks of legacy access control systems
Last month
More expert columns
By Robin Long & Raj Samani of Rapid7
Why the external attack surface matters: An analysis in...
Last month
By Ilan Rubin of Wavelink
The role of change management in cybersecurity awarenes...
Last month
By Crystal Morin of Sysdig
Cloud-native security: Best practices vs. convenience a...
Last month
By George Moawad of Genetec
Ensuring security without compromising privacy
Last month
By Wayne Phillips of SentinelOne
From investment to impact: Unlocking cybersecurity valu...
Last month
By George Moawad of Genetec
A proactive approach to cyber and physical security
Last month
Top players
You can read more from the top players NDI, Partners, CrowdStrike, Trend Micro, and Juniper Networks.
Recent news
About Ransomware
Kaspersky illuminates LockBit ransomware group's advanc...
Today
About Firewall
Absolute Security focuses on cyber resilience in compan...
Today
About Cyber Threats
Qualys offers free cybersecurity platform access after ...
Today
About Cyber Threats
IronScales expands partnership with Infinigate to UK & ...
Today
About Storage
Hitachi Vantara launches transformative hybrid cloud pl...
Yesterday
More expert columns
By George Moawad of Genetec
A proactive approach to cyber and physical security
Last month
By Matt Caffrey of Barracuda Australia
Five ways AI is already strengthening cyber-defences
Last month
By Jessie Jamieson of Tenable
IWD 2024: Moving past quotas: Inclusivity & neurodivers...
Last month
By Leanne Salisbury of Adarma
IWD 2024: Forging the path – The inspirational stories ...
Last month
By Nathan Wenzler of Tenable
Decoding the Microsoft breach: Key lessons to bolster c...
Last month
By Matias Madou of Secure Code Warrior
The importance of cybersecurity training for software d...
Wed, 28th Feb 2024
Video interviews
Discussing Threat detection
Video: 10 minute IT Jams - An update from Check Point S...
Fri, 18th Aug 2023
Discussing Cyber Criminal
Video: 10 Minute IT Jams - Another update from Mandiant
Fri, 18th Aug 2023
Discussing Management
Video: 10 Minute IT Jam - An update from Trustwave
Wed, 16th Aug 2023
Discussing Forensics
Video: 10 Minute IT Jams - An update from Cado Security
Thu, 13th Jul 2023
Discussing Cyber Threats
Video: 10 Minute IT Jams - The latest update from Sonic...
Mon, 24th Apr 2023
Even more expert columns
By Matias Madou of Secure Code Warrior
The importance of cybersecurity training for software d...
Wed, 28th Feb 2024
By Stephen Bovis of Oracle ANZ
Innovation, AI and Australia and New Zealand’s digital ...
Tue, 13th Feb 2024
By Matt Caffrey of Barracuda Australia
Advanced security tools can help bridge the cyber-skill...
Mon, 5th Feb 2024
By Scott McKinnel of Tenable ANZ
Exposure management: a strategic ally in essential eigh...
Mon, 5th Feb 2024
By Marius Van Der Merwe of i-PRO
The transformational power of AI in security
Wed, 17th Jan 2024
By Ash Shatrieh of F-Secure
Small businesses targeted by cyber criminals for data
Thu, 21st Dec 2023
By Dr. Jessie Jamieson of Tenable
Australia's six cyber shields: Will data science be sev...
Mon, 4th Dec 2023
By Nicko van Someren of Absolute Software
The pressing need for self-healing apps and network res...
Thu, 30th Nov 2023
By Paul Crighton of Barracuda Networks
Festive season alert: Rising cybercrime threatens busin...
Wed, 29th Nov 2023
By Leon Poggioli of Claroty
Revamp of cyber security measures needed amid rising gl...
Tue, 28th Nov 2023
More news
About Partner Awards
Rapid7 announces UK & Ireland winners of 2024 Partner A...
Yesterday
About Data Protection
IBM strengthens cyber resilience alliance with Cohesity
3 days ago
About IT Training
AI cybersecurity gap affecting quarter of UK businesses
Last week
About Phishing
New In the Wild 2024 report reveals key cyber threats
Last week
About Productivity
SentinelOne announces Purple AI for enhanced cybersecur...
Last week
Even more news
About Collaboration
Rising foreign interference exploits insider threats, s...
Last week
About Data Science
DTEX Systems bolsters insider risk management with Mand...
Last week
About Cyber Threats
Mandiant reveals threats to Ivanti Connect Secure appli...
Last week
About Cloud Services
UK IT leaders see transformative potential in generativ...
Last week
About Managed Services
ExtraHop hires Simon Howe, eyes expansion in Australia ...
This month
Job moves
Move at Zscaler
Zscaler boosts ANZ presence with high-profile leadershi...
This month
Move at Application Security
Major coup for Mindgard with new VP from cybersecurity ...
Last month
Move at Citadel
Earnix welcomes Daniel Shalom as new Chief Information ...
Fri, 23rd Feb 2024
Move at McAfee
BeyondTrust strengthens Asia Pacific expansion with key...
Thu, 15th Feb 2024
Move at Juniper Networks
Tina Stewart ascends as Chief Marketing Officer at Utim...
Thu, 15th Feb 2024
Other guides
You can read other related guides from Cybersecurity, Artificial Intelligence, Breach Prevention, AI Security, and Physical Security.
Powered by