The Ultimate Guide to Advanced Persistent Threat Protection
2025 edition
Overview
Most associated with industrial or political espionage (between opposing nations) Advanced Persistent Threats are characterized by stealth, persistence (the bad actor doesn’t let up), and a high degree of sophistication. A famous example is the Stuxnet attack targeting the Iranian nuclear program. Advanced Persistent Threat Protection is the specialised cybersecurity branch seeking to identify, prevent or mitigate these types of attack.
Analyst reports

Gartner on Physical Security
Claroty adds business-centred risk tools to xDome platf...
Last week

Gartner on SaaS
Claroty adds impact-centric tools for stronger CPS secu...
Last week

Gartner on Malware
Fortinet boosts workspace security suite with AI & new ...
Last week

Gartner on Firewalls
Vectra AI named leader in first Asia Pacific NDR Magic ...
Last week

Forrester Wave on IoT Security
Illumio & NVIDIA team up to boost Zero Trust for infras...
Last week
Featured news

About Cyber Threats
Exclusive: National cyber security coordinator says upc...
Last month

About Threat intelligence
Exclusive: How Proofpoint's partnership with Microsoft ...
Thu, 17th Apr 2025

About Ransomware
Google Threat Intelligence explains China’s evolving cy...
Wed, 16th Apr 2025

About EduTech
Google Cloud Canada grows with focus on AI and sovereig...
Thu, 10th Apr 2025

About Threat intelligence
Exclusive: Google Cloud Security VP on solving CISO pai...
Thu, 10th Apr 2025

About Data Protection
Google Cloud unveils AI-powered Unified Security platfo...
Thu, 10th Apr 2025

About Multi-factor authentication
Exclusive: Yubico pushes for wider protection under Aus...
Mon, 31st Mar 2025
Expert columns

By Robert Falzon of Check Point Software Canada
How AI is Reshaping the Cyber Threat Landscape
Last month

By Erich Kron of KnowBe4
Malicious memes: How cybercriminals use humour to sprea...
Last month

By Jamie Humphrey of Dell Technologies Australia & New Zealand
The Ransomware Threat: How to respond and protect your ...
Last month

By Gareth Cox of Exabeam
How businesses are fighting sophisticated cyber threats...
Last month

By Jason Whyte of Trustwave
How outsourcing and automation plug the cybersecurity s...
Last month
Interviews

Discussing Cyber Threats
Exclusive: National cyber security coordinator says upc...
Last month

Discussing Threat intelligence
Exclusive: How Proofpoint's partnership with Microsoft ...
Thu, 17th Apr 2025

Discussing Ransomware
Google Threat Intelligence explains China’s evolving cy...
Wed, 16th Apr 2025

Discussing EduTech
Google Cloud Canada grows with focus on AI and sovereig...
Thu, 10th Apr 2025

Discussing Threat intelligence
Exclusive: Google Cloud Security VP on solving CISO pai...
Thu, 10th Apr 2025
More expert columns

By Mary Attard of Accenture
A future with no passwords: Why passwordless authentica...
Last month

By Geoff Schomburgk of Yubico
AI’s impact on cybersecurity for the Australian federal...
Mon, 28th Apr 2025

By Dakshitaa Babu of SquareX
Your personal SaaS accounts could trigger a million-dol...
Tue, 22nd Apr 2025

By Chris Boyd of Rapid7
2025 Ransomware: Business as Usual, Business is Booming
Thu, 17th Apr 2025

By Rakesh Prabhakar of Zoho
How can small and medium businesses safeguard against r...
Thu, 17th Apr 2025

By Bryan Marlatt of CyXcel
Cyberattacks: A ticking time bomb for financial stabili...
Mon, 14th Apr 2025
Top players
Recent news

About Malware
Malware hits 16 React Native npm packages, 1m downloads...
Yesterday

About Hybrid Cloud
Global survey finds gaps leave cloud security dangerous...
Last week

About Firewalls
How managed XDR boosts cyber security visibility for SM...
Last week

About Cloud Services
Too many cloud security tools harming incident response...
Last week

About Firewalls
Cloud security gaps widen as AI threats outpace defence...
Last week
More news

About Bring Your Own Device
Portnox & CrowdStrike team up for real-time access cont...
Last week

About Ransomware
Arctic Wolf launches AI security platform in Singapore ...
Last week

About Ransomware
AI accelerates ransomware threat as attacks surge globa...
Last week

About Ransomware
Coalition Australia raises standard cyber crime cover t...
Last week

About Malware
AI agent adoption rises among IT security leaders in AN...
Last week
Even more news

About Sustainability
KnowBe4 shares tips to spot eco-themed cyber scams
Last week

About DevOps
ZEST Security partners with Upwind for faster AI-driven...
Last week

About Firewalls
Barracuda launches unified AI platform amid security to...
Last week

About Threat intelligence
Silobreaker launches AI dashboards to boost threat repo...
Last week

About Firewalls
Study finds 84% of severe cyber incidents use LOTL meth...
Last week
Job moves

Move at Exclusive Networks
Exclusive Networks names Burachai Phaiboonnukulkij Thai...
Last week

Move at Fortinet
Fortinet names Nicole Henry new ANZ Head of Government ...
Last week

Move at Ivanti
Securin appoints AI expert Dr. Mukkamala as new CEO
Last month

Move at Microsoft
Barracuda names Michelle Hodges as head of global chann...
Last month

Move at Pure Storage
Ekco appoints cloud industry veteran Ben Savage as CEO ...
Last month
Other guides
You can read other related guides from Cybersecurity, Artificial Intelligence, Risk & Compliance, Generative AI, and HealthTech.
Powered by