sponsored by Trusteer
Posted:  12 Dec 2013
Published:  12 Dec 2013
Format:  PDF
Length:  25  Page(s)
Type:  White Paper
Language:  English

Enterprises are unprepared to deal with APT attacks. According to a new Ponemon Institute study, APTs are changing the threat landscape, rendering current security controls ineffective.

In Advanced Persistent Threats (APTs) and targeted attacks, attackers use a myriad of tools and techniques to breach into an organizations’ network, steal sensitive information and compromise its operations. Many APTs are launched with a specific purpose such as to gather information, including financial data, PII, or other user information such as usernames and passwords. Others may take the form of a continuous barrage of targeted and sophisticated attacks aimed at governments, companies and individuals in order to compromise individual systems and organizations and conduct anything from reconnaissance to data exfiltration to service disruption. Criminal syndicates, nation-states, hacktivists and other types of politically motivated groups use APTs.


Security | Security Best Practices | Security Infrastructure | Security Management | Security Systems | Security Threats

View All Resources sponsored by Trusteer

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement