0
Illusive Networks uses deception to detect an attacker in your network
This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. The term "advanced persistent threat" is tossed around so frequently that some people might think that every cyberattack results from an APT. This is far from the case. In fact, APTs represent a very dangerous category of cyber threats that use sophisticated resources and techniques to evade detection and that are tenacious in their mission, whether it's to steal information or disrupt normal operations.NIST defines advanced persistent threat by describing three characteristics. The APT:1. Pursues its objectives repeatedly over an extended period of timeTo read this article in full or to leave a comment, please click here