Premium Content

Access "Understanding the advanced persistent threat"

Published: 19 Oct 2012

The term advanced persistent threat, or APT, joined the common vocabulary of the information security profession in mid-January, when Google announced its intellectual property had been the victim of a targeted attack originating from China. Google wasn't alone; more than 30 other technology firms, defense contractors and large enterprises had been penetrated by hackers using an array of social engineering, targeted malware and monitoring technologies to quietly access reams of sensitive corporate data. Google's public admission put a high-profile face on targeted attacks and the lengths attackers would go to gain access to proprietary corporate and military information. It also kicked off a spate of vendor marketing that promised counter-APT products and services that have only served to cloud the issue for security managers and operations people. In this article, we'll define APT, dispel some myths and explain what you can do about this adversary. WHAT IS THE ADVANCED PERSISTENT THREAT? The United States Air Force coined the phrase advanced persistent ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Is your mobile security strategy combating the wrong enemy?
    ism_0414.png
    E-Zine

    As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...

  • What's the best focus for MDM strategy now?
    best_focus_for_MDM.png
    E-Handbook

    This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...

  • Beat the security odds with a cloud risk equation
    ISM_0314.png
    E-Zine

    Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...