The ABCs of Advanced Persistent Threats

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28
Next The ABCs of Advanced Persistent Threats-8 Next

Global

Most APT victims are compromised by an attacker outside their country. China is the most common perpetrator, according to many reports, but certainly not the only one. This can significantly complicate taking legal action against the attacker, as some countries do not have laws against the actions of the attacker or will not prosecute crimes crossing global borders.

As employees and IT professionals return from the holidays, many are doing so with 2014 New Year’s resolutions in mind. For IT pros, we hope that one of your resolutions is to bolster your organization’s security and defenses in 2014. One of the rising threats that many IT professionals should be concerned about defending against in the new year is advanced persistent threats (APTs). According to the 2014 State of the Endpoint Report, conducted by the Ponemon Institute and sponsored by Lumension, 40 percent of organizations experienced an APT attack in the last 12 months. Paul Zimski of Lumension provides an overview of many of the key terms and themes associated with APTs to prevent you from becoming one of them.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.