Defensive approaches for APTs

By on
Defensive approaches for APTs

Study logs, whitelist, use multi-factor authentication and educate users.

Page 1 of 4  |  Single page
  In an advanced persistent threat (APT) attack, perpetrators research a specific target and customise the malware so that its signature cannot be identified by any existing anti-malware tools.       Crimes of opportunity happen every day. A car door left unlocked leads to ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Next Page 1 2 3 4 Single page
Copyright © SC Magazine, US edition

Most Read Articles

Log In

|  Forgot your password?