The Ultimate Guide to Advanced Persistent Threat Protection
2025 edition
Overview
Most associated with industrial or political espionage (between opposing nations) Advanced Persistent Threats are characterized by stealth, persistence (the bad actor doesn’t let up), and a high degree of sophistication. A famous example is the Stuxnet attack targeting the Iranian nuclear program. Advanced Persistent Threat Protection is the specialised cybersecurity branch seeking to identify, prevent or mitigate these types of attack.
Analyst reports

Gartner on Encryption
Australian firms lag in preparation for quantum computi...
This month

Gartner on Cloud Security
BlueVoyant launches tailored Microsoft Security optimis...
This month

Gartner on Firewalls
Radware secures record cloud security deal with US fina...
This month

IDC on Firewalls
Rapid7 unveils customisable MDR to boost enterprise sec...
Last month

Forrester Wave on Firewalls
Illumio unveils AI security graph for cloud threat resp...
Last month
Featured news

About Cyber Threats
Exclusive: National cyber security coordinator says upc...
Last week

About Threat intelligence
Exclusive: How Proofpoint's partnership with Microsoft ...
Last month

About Ransomware
Google Threat Intelligence explains China’s evolving cy...
Last month

About EduTech
Google Cloud Canada grows with focus on AI and sovereig...
Last month

About Threat intelligence
Exclusive: Google Cloud Security VP on solving CISO pai...
Last month

About Data Protection
Google Cloud unveils AI-powered Unified Security platfo...
Last month

About Multi-factor authentication
Exclusive: Yubico pushes for wider protection under Aus...
Mon, 31st Mar 2025

About Ransomware
Exclusive: Cyber threats escalate as Australian organis...
Thu, 6th Mar 2025

About Sustainability
Exclusive: HID discusses shift towards digital and AI-d...
Wed, 5th Mar 2025
Expert columns

By Erich Kron of KnowBe4
Malicious memes: How cybercriminals use humour to sprea...
Last week

By Jamie Humphrey of Dell Technologies Australia & New Zealand
The Ransomware Threat: How to respond and protect your ...
Last week

By Gareth Cox of Exabeam
How businesses are fighting sophisticated cyber threats...
This month

By Jason Whyte of Trustwave
How outsourcing and automation plug the cybersecurity s...
This month

By Mary Attard of Accenture
A future with no passwords: Why passwordless authentica...
This month
Interviews

Discussing Cyber Threats
Exclusive: National cyber security coordinator says upc...
Last week

Discussing Threat intelligence
Exclusive: How Proofpoint's partnership with Microsoft ...
Last month

Discussing Ransomware
Google Threat Intelligence explains China’s evolving cy...
Last month

Discussing EduTech
Google Cloud Canada grows with focus on AI and sovereig...
Last month

Discussing Threat intelligence
Exclusive: Google Cloud Security VP on solving CISO pai...
Last month
More expert columns

By Geoff Schomburgk of Yubico
AI’s impact on cybersecurity for the Australian federal...
Last month

By Dakshitaa Babu of SquareX
Your personal SaaS accounts could trigger a million-dol...
Last month

By Chris Boyd of Rapid7
2025 Ransomware: Business as Usual, Business is Booming
Last month

By Rakesh Prabhakar of Zoho
How can small and medium businesses safeguard against r...
Last month

By Bryan Marlatt of CyXcel
Cyberattacks: A ticking time bomb for financial stabili...
Last month

By Chris Fisher of Vectra AI
Outpacing AI-Driven cyber attacks: Strategies for moder...
Last month
Top players
Recent news

About Digitisation
SME CyberResilience aims to boost cyber defences for 2,...
Yesterday

About Cyber Threats
Cybersecurity professionals set to gain new trauma supp...
Yesterday

About Firewalls
Sophos partners with Capsule to streamline cyber insura...
Last week

About DevOps
Ekco acquires Predatech to boost UK cyber security serv...
Last week

About DevOps
Picus launches tool for real-time validation of exploit...
Last week
More news

About Software-as-a-Service
Immersive unveils new OT cybersecurity training for ind...
Last week

About Malware
Organisations boost AI security as data threats & risks...
Last week

About Firewalls
Exabeam & Vectra AI partner to boost threat detection s...
Last week

About Hybrid Cloud
Gigamon survey finds AI drives hybrid cloud breach rise...
Last week

About Cyber Criminal
Exclusive: Cyber expert Louise Hanna warns education, p...
Last week
Even more news

About Cloud Services
AI-driven threats prompt IT leaders to rethink hybrid c...
Last week

About Cloud Services
Report finds low ECH use but risks from malicious actor...
Last week

About Shadow IT
Organisations ramp up AI tool blocks to counter shadow ...
Last week

About Collaboration
Survey reveals gap between threat intelligence & execut...
Last week

About Small Business
Cynet launches next-gen AI threat detection, cuts false...
Last week
Job moves

Move at Ivanti
Securin appoints AI expert Dr. Mukkamala as new CEO
Yesterday

Move at Microsoft
Barracuda names Michelle Hodges as head of global chann...
This month

Move at Pure Storage
Ekco appoints cloud industry veteran Ben Savage as CEO ...
This month

Move at CyberArk
CyberArk appoints Jeremy Sim to lead channel growth in ...
This month

Move at Microsoft
Tenable appoints Eric Doerr as Chief Product Officer to...
This month
Other guides
You can read other related guides from Cybersecurity, Artificial Intelligence, Risk & Compliance, Generative AI, and HealthTech.
Powered by