Ponemon Study: The State of Advanced Persistent Threats

Ponemon Study: The State of Advanced Persistent Threats

Cover

Enterprises are unprepared to deal with APT attacks. According to a new Ponemon Institute study, APTs are changing the threat landscape, rendering current security controls ineffective.

In Advanced Persistent Threats (APTs) and targeted attacks, attackers use a myriad of tools and techniques to breach into an organizations’ network, steal sensitive information and compromise its operations. Many APTs are launched with a specific purpose such as to gather information, including financial data, PII, or other user information such as usernames and passwords. Others may take the form of a continuous barrage of targeted and sophisticated attacks aimed at governments, companies and individuals in order to compromise individual systems and organizations and conduct anything from reconnaissance to data exfiltration to service disruption. Criminal syndicates, nation-states, hacktivists and other types of politically motivated groups use APTs.

 

Vendor:
Trusteer
Posted:
12 Dec 2013
Published:
12 Dec 2013
Format:
PDF
Length:
25 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy