Cloud application migration

Advanced persistent attack News

View All News

Advanced persistent attack Get Started

Bring yourself up to speed with our introductory content

  • Interception threatens TLS security; now what?

    As global cyberattacks have exploded in recent months, the speed of infection is causing damage, not only to targeted industries and nation states, but to corporate valuations. In June, FedEx warned that the Petya cyberattack, which disrupted operations at its TNT Express subsidiary, may have "material impact" on the company's 2017 financial performance. Merck & Co. Inc., another victim of the cyberattack, issued a similar warning. A Trojan that morphed into a worm, Petya -- sometimes called NotPetya -- brought increased attention to the lack of security fundamentals practiced at major companies.

    The majority of these threats enter networks through malware delivered via the internet. However, as the growth of HTTPS deployment continues, some companies are increasingly using Transport Layer Security (TLS) interception by middleboxes to maintain visibility into TLS security and malicious software. Researchers from top universities and technology companies, including Google, Mozilla and Cloudflare, published an HTTPS interception study in April that offered startling statistics on TLS security.

    In this issue of Information Security magazine, we look at how worms play a role in advanced persistent threats and the ongoing issues related to HTTPS inspection and TLS security.

     Continue Reading

  • Advanced Persistent Security

    In this excerpt from chapter seven of Advanced Persistent Security, authors Araceli Treu Gomes and Ira Winkler discuss the different threats facing organizations. Continue Reading

  • Outsourcing security services rises as MSSPs focus on industries

    Despite increasing levels of specialization, managed security service providers often don't understand the business you're in. That may be changing. Continue Reading

View All Get Started

Evaluate Advanced persistent attack Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Advanced persistent attack

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Advanced persistent attack Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve