Access your Pro+ Content below.
Understanding the advanced persistent threat
This article is part of the July/August 2010 issue of Information Security magazine
The term advanced persistent threat, or APT, joined the common vocabulary of the information security profession in mid-January, when Google announced its intellectual property had been the victim of a targeted attack originating from China. Google wasn't alone; more than 30 other technology firms, defense contractors and large enterprises had been penetrated by hackers using an array of social engineering, targeted malware and monitoring technologies to quietly access reams of sensitive corporate data. Google's public admission put a high-profile face on targeted attacks and the lengths attackers would go to gain access to proprietary corporate and military information. It also kicked off a spate of vendor marketing that promised counter-APT products and services that have only served to cloud the issue for security managers and operations people. In this article, we'll define APT, dispel some myths and explain what you can do about this adversary. WHAT IS THE ADVANCED PERSISTENT THREAT? The United States Air Force coined the ...
Features in this issue
No clear answers at conference but experts urge organizations to proceed with caution.
Your information security skills matrix – that connection between your tangible skills and personal qualities – is what separates you from your peers.
Think you know all you need to know about the advanced persistent threat? We'll define APT and dispel a few myths.
Security software-as-a-service can help organizations reduce security headaches but also can present challenges.
Columns in this issue
Use an information security maturity model to illustrate how security supports the organization.
Building a career plan just might lead security professionals headfirst into some dubious challenges.
Insecure software has been a long-standing issue in the industry. Progress on secure software development is critical.