The Ultimate Guide to Advanced Persistent Threat Protection
2024 edition
Overview
Most associated with industrial or political espionage (between opposing nations) Advanced Persistent Threats are characterized by stealth, persistence (the bad actor doesn’t let up), and a high degree of sophistication. A famous example is the Stuxnet attack targeting the Iranian nuclear program. Advanced Persistent Threat Protection is the specialised cybersecurity branch seeking to identify, prevent or mitigate these types of attack.
Analyst reports
ABI Research on Firewall
Cyber threats prompt UK industries to prioritise cybers...
Thu, 28th Mar 2024
IDC MarketScape on Ransomware
Canadian ISA Cybersecurity launches first UK operation ...
Thu, 28th Mar 2024
IDC MarketScape on Firewall
Sophos leads in IDC MarketScape's cybersecurity assessm...
Fri, 15th Mar 2024
IDC on Firewall
Ransomware peaks as top threat in ANZ as study highligh...
Tue, 12th Mar 2024
Miercom on Cybersecurity
Check Point's Infinity Platform crowned leading Zero Tr...
Mon, 11th Mar 2024
Featured news
About Passwords
Exclusive: Insights from Yubico on World Password Day
3 days ago
About Collaboration
Titans of Tech - Mike East of Cado Security
Last month
About Cloud Services
Exclusive: How Okta is fortifying digital identities
Wed, 13th Mar 2024
About Cyber Threats
Exclusive: Aura sheds insights on the state of cybersec...
Wed, 6th Mar 2024
About Cloud Services
Exclusive: Why Commvault's focused on cyber resilience
Wed, 6th Mar 2024
Expert columns
By Nathan Wenzler of Tenable
Customers vs banks - Where should the buck stop in prev...
Last week
By Adam Khan of Barracuda XDR
How attackers target security blind spots: Three real-l...
Last month
By Mark Gorrie of Gen Digital Inc
Watch out! There are hidden dangers lurking in your PDF...
Last month
By Mark Gorrie of Gen Digital Inc
One wrong click can devastate your small business: so w...
Last month
By Richard Sorosina of Qualys
Software supply chain security: Finding the weakest lin...
Last month
More expert columns
By Brett Chase of Cohesity
The imperative to go beyond backup, by focusing on cybe...
Thu, 28th Mar 2024
By George Moawad of Genetec
Cybersecurity risks of legacy access control systems
Mon, 25th Mar 2024
By Robin Long & Raj Samani of Rapid7
Why the external attack surface matters: An analysis in...
Fri, 22nd Mar 2024
By Ilan Rubin of Wavelink
The role of change management in cybersecurity awarenes...
Thu, 21st Mar 2024
By Crystal Morin of Sysdig
Cloud-native security: Best practices vs. convenience a...
Wed, 20th Mar 2024
By George Moawad of Genetec
Ensuring security without compromising privacy
Mon, 18th Mar 2024
Top players
Recent news
About Data Protection
Claire Williams to headline Infosecurity Europe 2024
Yesterday
About Cloud Security
Illumio & Wiz partner to boost cloud security resilienc...
Yesterday
About Ransomware
Industrial sector sees 17% drop in ransomware attacks i...
Yesterday
About Firewall
Ransomware attack costs on Australian firms soar, revea...
2 days ago
About Cloud Services
Commvault launches Cloud Cleanroom for cyber attack rec...
2 days ago
More expert columns
By George Moawad of Genetec
Ensuring security without compromising privacy
Mon, 18th Mar 2024
By Wayne Phillips of SentinelOne
From investment to impact: Unlocking cybersecurity valu...
Thu, 14th Mar 2024
By George Moawad of Genetec
A proactive approach to cyber and physical security
Wed, 13th Mar 2024
By Matt Caffrey of Barracuda Australia
Five ways AI is already strengthening cyber-defences
Tue, 12th Mar 2024
By Jessie Jamieson of Tenable
IWD 2024: Moving past quotas: Inclusivity & neurodivers...
Fri, 8th Mar 2024
By Leanne Salisbury of Adarma
IWD 2024: Forging the path – The inspirational stories ...
Fri, 8th Mar 2024
Video interviews
Discussing Threat detection
Video: 10 minute IT Jams - An update from Check Point S...
Fri, 18th Aug 2023
Discussing Cyber Criminal
Video: 10 Minute IT Jams - Another update from Mandiant
Fri, 18th Aug 2023
Discussing Management
Video: 10 Minute IT Jam - An update from Trustwave
Wed, 16th Aug 2023
Discussing Forensics
Video: 10 Minute IT Jams - An update from Cado Security
Thu, 13th Jul 2023
Even more expert columns
By Leanne Salisbury of Adarma
IWD 2024: Forging the path – The inspirational stories ...
Fri, 8th Mar 2024
By Nathan Wenzler of Tenable
Decoding the Microsoft breach: Key lessons to bolster c...
Mon, 4th Mar 2024
By Matias Madou of Secure Code Warrior
The importance of cybersecurity training for software d...
Wed, 28th Feb 2024
By Stephen Bovis of Oracle ANZ
Innovation, AI and Australia and New Zealand’s digital ...
Tue, 13th Feb 2024
By Matt Caffrey of Barracuda Australia
Advanced security tools can help bridge the cyber-skill...
Mon, 5th Feb 2024
By Scott McKinnel of Tenable ANZ
Exposure management: a strategic ally in essential eigh...
Mon, 5th Feb 2024
By Marius Van Der Merwe of i-PRO
The transformational power of AI in security
Wed, 17th Jan 2024
By Ash Shatrieh of F-Secure
Small businesses targeted by cyber criminals for data
Thu, 21st Dec 2023
By Dr. Jessie Jamieson of Tenable
Australia's six cyber shields: Will data science be sev...
Mon, 4th Dec 2023
By Nicko van Someren of Absolute Software
The pressing need for self-healing apps and network res...
Thu, 30th Nov 2023
More news
About Security breaches
Sysdig introduces AI Workload Security for enhanced clo...
2 days ago
About IoT Security
Sekuro & Dragos team up to fortify Australian critical ...
3 days ago
About Leadership
UK financial leaders fear cyber threats to nation's AI ...
3 days ago
About Security Information and Event Management
Logpoint unveils platform enhancements for improved cyb...
3 days ago
About Productivity
Singapore SMEs less aware of cyber threats but AI impac...
4 days ago
Even more news
About Cyber Threats
ThreatLocker raises USD $115m for global expansion of Z...
4 days ago
About Collaboration
Portnox teams up with Bugcrowd for private bug bounty p...
4 days ago
About Cyber Threats
Smarttech247 & SentinelOne launch AI-powered cybersecur...
Last week
About Ransomware
High Performance Podcast duo to keynote Infosecurity Eu...
Last week
About Collaboration
HP introduces AI-powered personal computers in Australi...
Last week
Job moves
Move at Vectra AI
Former Google Cloud VP Jeff Reed joins Vectra AI as Chi...
Last week
Move at Zscaler
Zscaler boosts ANZ presence with high-profile leadershi...
Last month
Move at Application Security
Major coup for Mindgard with new VP from cybersecurity ...
Fri, 1st Mar 2024
Move at Citadel
Earnix welcomes Daniel Shalom as new Chief Information ...
Fri, 23rd Feb 2024
Move at McAfee
BeyondTrust strengthens Asia Pacific expansion with key...
Thu, 15th Feb 2024
Other guides
You can read other related guides from Cybersecurity, Artificial Intelligence, Breach Prevention, AI Security, and Partner Programmes.
Powered by