The Ultimate Guide to Advanced Persistent Threat Protection
2025 edition
Overview
Most associated with industrial or political espionage (between opposing nations) Advanced Persistent Threats are characterized by stealth, persistence (the bad actor doesn’t let up), and a high degree of sophistication. A famous example is the Stuxnet attack targeting the Iranian nuclear program. Advanced Persistent Threat Protection is the specialised cybersecurity branch seeking to identify, prevent or mitigate these types of attack.
Analyst reports

Gartner on Encryption
Australian firms lag in preparation for quantum computi...
Last week

Gartner on Cloud Security
BlueVoyant launches tailored Microsoft Security optimis...
This month

Gartner on Firewalls
Radware secures record cloud security deal with US fina...
This month

IDC on Firewalls
Rapid7 unveils customisable MDR to boost enterprise sec...
Last month

Forrester Wave on Firewalls
Illumio unveils AI security graph for cloud threat resp...
Last month
Featured news

About Threat intelligence
Exclusive: How Proofpoint's partnership with Microsoft ...
Last month

About Ransomware
Google Threat Intelligence explains China’s evolving cy...
Last month

About EduTech
Google Cloud Canada grows with focus on AI and sovereig...
Last month

About Threat intelligence
Exclusive: Google Cloud Security VP on solving CISO pai...
Last month

About Data Protection
Google Cloud unveils AI-powered Unified Security platfo...
Last month

About Multi-factor authentication
Exclusive: Yubico pushes for wider protection under Aus...
Mon, 31st Mar 2025

About Ransomware
Exclusive: Cyber threats escalate as Australian organis...
Thu, 6th Mar 2025

About Sustainability
Exclusive: HID discusses shift towards digital and AI-d...
Wed, 5th Mar 2025
Expert columns

By Erich Kron of KnowBe4
Malicious memes: How cybercriminals use humour to sprea...
Yesterday

By Jamie Humphrey of Dell Technologies Australia & New Zealand
The Ransomware Threat: How to respond and protect your ...
4 days ago

By Gareth Cox of Exabeam
How businesses are fighting sophisticated cyber threats...
Last week

By Jason Whyte of Trustwave
How outsourcing and automation plug the cybersecurity s...
This month

By Mary Attard of Accenture
A future with no passwords: Why passwordless authentica...
This month
Interviews

Discussing Threat intelligence
Exclusive: How Proofpoint's partnership with Microsoft ...
Last month

Discussing Ransomware
Google Threat Intelligence explains China’s evolving cy...
Last month

Discussing EduTech
Google Cloud Canada grows with focus on AI and sovereig...
Last month

Discussing Threat intelligence
Exclusive: Google Cloud Security VP on solving CISO pai...
Last month

Discussing Data Protection
Google Cloud unveils AI-powered Unified Security platfo...
Last month
More expert columns

By Geoff Schomburgk of Yubico
AI’s impact on cybersecurity for the Australian federal...
Last month

By Dakshitaa Babu of SquareX
Your personal SaaS accounts could trigger a million-dol...
Last month

By Chris Boyd of Rapid7
2025 Ransomware: Business as Usual, Business is Booming
Last month

By Rakesh Prabhakar of Zoho
How can small and medium businesses safeguard against r...
Last month

By Bryan Marlatt of CyXcel
Cyberattacks: A ticking time bomb for financial stabili...
Last month

By Chris Fisher of Vectra AI
Outpacing AI-Driven cyber attacks: Strategies for moder...
Last month
Top players
Recent news

About Cyber Criminal
Exclusive: Cyber expert Louise Hanna warns education, p...
Yesterday

About Cloud Services
AI-driven threats prompt IT leaders to rethink hybrid c...
Yesterday

About Cloud Services
Report finds low ECH use but risks from malicious actor...
Yesterday

About Shadow IT
Organisations ramp up AI tool blocks to counter shadow ...
Yesterday

About Collaboration
Survey reveals gap between threat intelligence & execut...
Yesterday
More news

About Small Business
Cynet launches next-gen AI threat detection, cuts false...
Yesterday

About Ransomware
Ransomware attacks on industrial targets surge, AI tact...
Yesterday

About Cloud Services
Rubrik & Rackspace launch managed cyber recovery for cl...
Yesterday

About Firewalls
Exabeam partners with Vectra AI to boost cloud threat d...
2 days ago

About Renewable energy
Australia’s renewable energy shift fuels foreign cyber ...
2 days ago
Even more news

About Ransomware
Cohesity expands Google Cloud partnership for cyber res...
3 days ago

About Data breach
AI investment rises as security teams battle skills sho...
3 days ago

About Threat intelligence
Outpost24 adds AI summaries to boost digital threat ana...
3 days ago

About Malware
Organisations prioritise AI security as GenAI adoption ...
3 days ago

About Malware
Australia faces mounting cyber threats to vital infrast...
3 days ago
Job moves

Move at Microsoft
Barracuda names Michelle Hodges as head of global chann...
Last week

Move at Pure Storage
Ekco appoints cloud industry veteran Ben Savage as CEO ...
Last week

Move at CyberArk
CyberArk appoints Jeremy Sim to lead channel growth in ...
This month

Move at Microsoft
Tenable appoints Eric Doerr as Chief Product Officer to...
This month

Move at BitSight
BeyondTrust names Sean Malone as new Chief Information ...
Last month
Other guides
You can read other related guides from Cybersecurity, Artificial Intelligence, Risk & Compliance, Generative AI, and HealthTech.
Powered by