The Ultimate Guide to Advanced Persistent Threat Protection
2025 edition
Overview
Most associated with industrial or political espionage (between opposing nations) Advanced Persistent Threats are characterized by stealth, persistence (the bad actor doesn’t let up), and a high degree of sophistication. A famous example is the Stuxnet attack targeting the Iranian nuclear program. Advanced Persistent Threat Protection is the specialised cybersecurity branch seeking to identify, prevent or mitigate these types of attack.
Analyst reports

Gartner on Encryption
Australian firms lag in preparation for quantum computi...
Last week

Gartner on Cloud Security
BlueVoyant launches tailored Microsoft Security optimis...
This month

Gartner on Firewalls
Radware secures record cloud security deal with US fina...
This month

IDC on Firewalls
Rapid7 unveils customisable MDR to boost enterprise sec...
Last month

Forrester Wave on Firewalls
Illumio unveils AI security graph for cloud threat resp...
Last month
Featured news

About Cyber Threats
Exclusive: National cyber security coordinator says upc...
2 days ago

About Threat intelligence
Exclusive: How Proofpoint's partnership with Microsoft ...
Last month

About Ransomware
Google Threat Intelligence explains China’s evolving cy...
Last month

About EduTech
Google Cloud Canada grows with focus on AI and sovereig...
Last month

About Threat intelligence
Exclusive: Google Cloud Security VP on solving CISO pai...
Last month

About Data Protection
Google Cloud unveils AI-powered Unified Security platfo...
Last month

About Multi-factor authentication
Exclusive: Yubico pushes for wider protection under Aus...
Mon, 31st Mar 2025

About Ransomware
Exclusive: Cyber threats escalate as Australian organis...
Thu, 6th Mar 2025

About Sustainability
Exclusive: HID discusses shift towards digital and AI-d...
Wed, 5th Mar 2025
Expert columns

By Erich Kron of KnowBe4
Malicious memes: How cybercriminals use humour to sprea...
3 days ago

By Jamie Humphrey of Dell Technologies Australia & New Zealand
The Ransomware Threat: How to respond and protect your ...
6 days ago

By Gareth Cox of Exabeam
How businesses are fighting sophisticated cyber threats...
Last week

By Jason Whyte of Trustwave
How outsourcing and automation plug the cybersecurity s...
This month

By Mary Attard of Accenture
A future with no passwords: Why passwordless authentica...
This month
Interviews

Discussing Cyber Threats
Exclusive: National cyber security coordinator says upc...
2 days ago

Discussing Threat intelligence
Exclusive: How Proofpoint's partnership with Microsoft ...
Last month

Discussing Ransomware
Google Threat Intelligence explains China’s evolving cy...
Last month

Discussing EduTech
Google Cloud Canada grows with focus on AI and sovereig...
Last month

Discussing Threat intelligence
Exclusive: Google Cloud Security VP on solving CISO pai...
Last month
More expert columns

By Geoff Schomburgk of Yubico
AI’s impact on cybersecurity for the Australian federal...
Last month

By Dakshitaa Babu of SquareX
Your personal SaaS accounts could trigger a million-dol...
Last month

By Chris Boyd of Rapid7
2025 Ransomware: Business as Usual, Business is Booming
Last month

By Rakesh Prabhakar of Zoho
How can small and medium businesses safeguard against r...
Last month

By Bryan Marlatt of CyXcel
Cyberattacks: A ticking time bomb for financial stabili...
Last month

By Chris Fisher of Vectra AI
Outpacing AI-Driven cyber attacks: Strategies for moder...
Last month
Top players
Recent news

About Firewalls
Sophos partners with Capsule to streamline cyber insura...
2 days ago

About DevOps
Ekco acquires Predatech to boost UK cyber security serv...
3 days ago

About DevOps
Picus launches tool for real-time validation of exploit...
3 days ago

About Software-as-a-Service
Immersive unveils new OT cybersecurity training for ind...
3 days ago

About Malware
Organisations boost AI security as data threats & risks...
3 days ago
More news

About Hybrid Cloud
Gigamon survey finds AI drives hybrid cloud breach rise...
3 days ago

About Firewalls
Exabeam & Vectra AI partner to boost threat detection s...
3 days ago

About Cyber Criminal
Exclusive: Cyber expert Louise Hanna warns education, p...
3 days ago

About Cloud Services
AI-driven threats prompt IT leaders to rethink hybrid c...
3 days ago

About Cloud Services
Report finds low ECH use but risks from malicious actor...
3 days ago
Even more news

About Shadow IT
Organisations ramp up AI tool blocks to counter shadow ...
3 days ago

About Collaboration
Survey reveals gap between threat intelligence & execut...
3 days ago

About Small Business
Cynet launches next-gen AI threat detection, cuts false...
3 days ago

About Ransomware
Ransomware attacks on industrial targets surge, AI tact...
3 days ago

About Cloud Services
Rubrik & Rackspace launch managed cyber recovery for cl...
3 days ago
Job moves

Move at Microsoft
Barracuda names Michelle Hodges as head of global chann...
Last week

Move at Pure Storage
Ekco appoints cloud industry veteran Ben Savage as CEO ...
Last week

Move at CyberArk
CyberArk appoints Jeremy Sim to lead channel growth in ...
This month

Move at Microsoft
Tenable appoints Eric Doerr as Chief Product Officer to...
This month

Move at BitSight
BeyondTrust names Sean Malone as new Chief Information ...
Last month
Other guides
You can read other related guides from Cybersecurity, Artificial Intelligence, Risk & Compliance, Generative AI, and HealthTech.
Powered by