1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Illusive Networks uses deception to detect an attacker in your network

Discussion in 'Network World' started by RSS, Aug 12, 2016.

  1. RSS

    RSS New Member Member

    This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.

    The term "advanced persistent threat" is tossed around so frequently that some people might think that every cyberattack results from an APT. This is far from the case. In fact, APTs represent a very dangerous category of cyber threats that use sophisticated resources and techniques to evade detection and that are tenacious in their mission, whether it's to steal information or disrupt normal operations.

    NIST defines advanced persistent threat by describing three characteristics. The APT:

    1. Pursues its objectives repeatedly over an extended period of time

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page