The Ultimate Guide to Advanced Persistent Threat Protection
2025 edition
Overview
Most associated with industrial or political espionage (between opposing nations) Advanced Persistent Threats are characterized by stealth, persistence (the bad actor doesn’t let up), and a high degree of sophistication. A famous example is the Stuxnet attack targeting the Iranian nuclear program. Advanced Persistent Threat Protection is the specialised cybersecurity branch seeking to identify, prevent or mitigate these types of attack.
Analyst reports

Gartner on SOC
Infinigate & Torq partner to roll out AI security solut...
Last week

Gartner on Hybrid Cloud
Radiant Logic launches AI tool for identity visibility
Last week

Gartner Market Guide on Data Protection
Zscaler to acquire Red Canary to boost AI-powered secur...
Last week

Gartner on Encryption
Australian firms lag in preparation for quantum computi...
Last month

Gartner on Cloud Security
BlueVoyant launches tailored Microsoft Security optimis...
Last month
Featured news

About Cyber Threats
Exclusive: National cyber security coordinator says upc...
Last month

About Threat intelligence
Exclusive: How Proofpoint's partnership with Microsoft ...
Thu, 17th Apr 2025

About Ransomware
Google Threat Intelligence explains China’s evolving cy...
Wed, 16th Apr 2025

About EduTech
Google Cloud Canada grows with focus on AI and sovereig...
Thu, 10th Apr 2025

About Threat intelligence
Exclusive: Google Cloud Security VP on solving CISO pai...
Thu, 10th Apr 2025

About Data Protection
Google Cloud unveils AI-powered Unified Security platfo...
Thu, 10th Apr 2025

About Multi-factor authentication
Exclusive: Yubico pushes for wider protection under Aus...
Mon, 31st Mar 2025

About Ransomware
Exclusive: Cyber threats escalate as Australian organis...
Thu, 6th Mar 2025

About Sustainability
Exclusive: HID discusses shift towards digital and AI-d...
Wed, 5th Mar 2025
Expert columns

By Robert Falzon of Check Point Software Canada
How AI is Reshaping the Cyber Threat Landscape
Last week

By Erich Kron of KnowBe4
Malicious memes: How cybercriminals use humour to sprea...
Last month

By Jamie Humphrey of Dell Technologies Australia & New Zealand
The Ransomware Threat: How to respond and protect your ...
Last month

By Gareth Cox of Exabeam
How businesses are fighting sophisticated cyber threats...
Last month

By Jason Whyte of Trustwave
How outsourcing and automation plug the cybersecurity s...
Last month
Interviews

Discussing Cyber Threats
Exclusive: National cyber security coordinator says upc...
Last month

Discussing Threat intelligence
Exclusive: How Proofpoint's partnership with Microsoft ...
Thu, 17th Apr 2025

Discussing Ransomware
Google Threat Intelligence explains China’s evolving cy...
Wed, 16th Apr 2025

Discussing EduTech
Google Cloud Canada grows with focus on AI and sovereig...
Thu, 10th Apr 2025

Discussing Threat intelligence
Exclusive: Google Cloud Security VP on solving CISO pai...
Thu, 10th Apr 2025
More expert columns

By Mary Attard of Accenture
A future with no passwords: Why passwordless authentica...
Last month

By Geoff Schomburgk of Yubico
AI’s impact on cybersecurity for the Australian federal...
Mon, 28th Apr 2025

By Dakshitaa Babu of SquareX
Your personal SaaS accounts could trigger a million-dol...
Tue, 22nd Apr 2025

By Chris Boyd of Rapid7
2025 Ransomware: Business as Usual, Business is Booming
Thu, 17th Apr 2025

By Rakesh Prabhakar of Zoho
How can small and medium businesses safeguard against r...
Thu, 17th Apr 2025

By Bryan Marlatt of CyXcel
Cyberattacks: A ticking time bomb for financial stabili...
Mon, 14th Apr 2025
Top players
Recent news

About Privacy
Canadian IT leaders weigh AI agent risks & opportunitie...
Last week

About Data Protection
AI-driven cybersecurity shapes future of managed servic...
Last week

About Firewalls
Barracuda names Phoenix Software & partners as 2025 awa...
Last week

About Cloud Services
Outpost24 becomes only European overall leader in ASM r...
Last week

About EduTech
AARNet & CrowdStrike boost cybersecurity for research s...
Last week
More news

About Enterprise security
Cisco Duo launches identity service to tackle AI cyber ...
Last week

About Malware
AI-fuelled scams & phishing soar in New Zealand, says G...
Last week

About Digitisation
SME CyberResilience aims to boost cyber defences for 2,...
Last week

About Cyber Threats
Cybersecurity professionals set to gain new trauma supp...
Last week

About Firewalls
Sophos partners with Capsule to streamline cyber insura...
Last month
Even more news

About DevOps
Ekco acquires Predatech to boost UK cyber security serv...
Last month

About DevOps
Picus launches tool for real-time validation of exploit...
Last month

About Software-as-a-Service
Immersive unveils new OT cybersecurity training for ind...
Last month

About Malware
Organisations boost AI security as data threats & risks...
Last month

About Hybrid Cloud
Gigamon survey finds AI drives hybrid cloud breach rise...
Last month
Job moves

Move at Fortinet
Fortinet names Nicole Henry new ANZ Head of Government ...
Yesterday

Move at Ivanti
Securin appoints AI expert Dr. Mukkamala as new CEO
Last week

Move at Microsoft
Barracuda names Michelle Hodges as head of global chann...
Last month

Move at Pure Storage
Ekco appoints cloud industry veteran Ben Savage as CEO ...
Last month

Move at CyberArk
CyberArk appoints Jeremy Sim to lead channel growth in ...
Last month
Other guides
You can read other related guides from Cybersecurity, Artificial Intelligence, Risk & Compliance, Generative AI, and HealthTech.
Powered by