21:49
"5 Advanced Persistent Threats APT You MUST Know About"
Kevin Henry (CISSP, CISA, CRISC) reviews the Top 5 "Advanced Persistent Threats" or "APTs"...
published: 22 Oct 2012
author: Max Dalziel
"5 Advanced Persistent Threats APT You MUST Know About"
"5 Advanced Persistent Threats APT You MUST Know About"
Kevin Henry (CISSP, CISA, CRISC) reviews the Top 5 "Advanced Persistent Threats" or "APTs" in the world. After watching the clip you will learn about "APT Pr...- published: 22 Oct 2012
- views: 303
- author: Max Dalziel
5:48
Rik Ferguson - Advanced Persistent Threats
Advanced Persistent Threats - Not a "what", but, a "who"! Rik is a colleague at Trend Micr...
published: 03 Oct 2012
author: Phil DuRall
Rik Ferguson - Advanced Persistent Threats
Rik Ferguson - Advanced Persistent Threats
Advanced Persistent Threats - Not a "what", but, a "who"! Rik is a colleague at Trend Micro in Europe. Watch as he gives some insight on the workings of APTs...- published: 03 Oct 2012
- views: 2382
- author: Phil DuRall
2:38
What is Advanced Persistent Threat?
Advanced Persistent Threats are highly sophisticated, targeted attacks aimed at compromisi...
published: 04 Oct 2010
author: IBMSecuritySolutions
What is Advanced Persistent Threat?
What is Advanced Persistent Threat?
Advanced Persistent Threats are highly sophisticated, targeted attacks aimed at compromising confidential information. This video describes what advanced per...- published: 04 Oct 2010
- views: 2510
- author: IBMSecuritySolutions
12:03
How to protect your data from Advanced Persistent Threats (APT)?
SecureAge SecureData protects your data from Advanced Persistent Threats (APT) and sophist...
published: 07 Jan 2012
author: SecureAge
How to protect your data from Advanced Persistent Threats (APT)?
How to protect your data from Advanced Persistent Threats (APT)?
SecureAge SecureData protects your data from Advanced Persistent Threats (APT) and sophisticated malwares. Please visit http://www.secureage.com/prd_SecureDa...- published: 07 Jan 2012
- views: 799
- author: SecureAge
3:01
Network security threats explained: Advanced persistent threats (APTs)
http://www.sophos.com/en-us/lp/network-threats What exactly is an "advanced persistent thr...
published: 12 Dec 2013
Network security threats explained: Advanced persistent threats (APTs)
Network security threats explained: Advanced persistent threats (APTs)
http://www.sophos.com/en-us/lp/network-threats What exactly is an "advanced persistent threat" (APT)? Sophos security expert James Lyne breaks down this somewhat complicated and overused term.- published: 12 Dec 2013
- views: 420
4:07
Security Vitamins: Advanced Persistent Threat (APT)
Advanced Persistent Threat (APT) Awareness Video
Advanced Persistent Threat usually refer...
published: 03 Dec 2013
Security Vitamins: Advanced Persistent Threat (APT)
Security Vitamins: Advanced Persistent Threat (APT)
Advanced Persistent Threat (APT) Awareness Video Advanced Persistent Threat usually refers to a specific group of people who are determined to perform a cyber attack / espionage to a certain entity i.e. companies, government and etc. Since it is one of the emerging threat in cyber security. It is important for us to educate our workforce on how to identify, manage and mitigate this threat in the organization. This video will role play a situation of an APT attack and some tips on how to mitigate it at the end of the video. For more information, visit our website at www.securityvitamins.com - Take Security Vitamins and Stay Security Healthy!- published: 03 Dec 2013
- views: 12
69:49
The Advanced Persistent Threat Scenario in 2012
In this video Tom Cross, Manager of X-Force Threat Intelligence Strategy, talks about the ...
published: 09 May 2012
author: IBMSecuritySolutions
The Advanced Persistent Threat Scenario in 2012
The Advanced Persistent Threat Scenario in 2012
In this video Tom Cross, Manager of X-Force Threat Intelligence Strategy, talks about the advanced persistent threat in 2012. Learn more: http://ibm.com/secu...- published: 09 May 2012
- views: 1636
- author: IBMSecuritySolutions
2:32
Bit9 Advanced Persistent Threat Detection
The Bit9 Platform combines real-time sensors, Advanced Threat Indicators (ATI) and the clo...
published: 22 Mar 2013
author: Bit9Inc
Bit9 Advanced Persistent Threat Detection
Bit9 Advanced Persistent Threat Detection
The Bit9 Platform combines real-time sensors, Advanced Threat Indicators (ATI) and the cloud-based Bit9 Software Reputation Service to immediately detect adv...- published: 22 Mar 2013
- views: 1545
- author: Bit9Inc
56:10
Advanced Persistent Threat Protection Webinar
...
published: 02 Feb 2012
author: IntelMcAfeeIdentity
Advanced Persistent Threat Protection Webinar
Advanced Persistent Threat Protection Webinar
- published: 02 Feb 2012
- views: 118
- author: IntelMcAfeeIdentity
29:19
Dissecting the Advanced Persistent Threat
The Advanced Persistent Threat (APT) is a terrifying concept as it means an attacker has g...
published: 28 Aug 2013
Dissecting the Advanced Persistent Threat
Dissecting the Advanced Persistent Threat
The Advanced Persistent Threat (APT) is a terrifying concept as it means an attacker has gained unauthorized access to your environment and has been there long enough to be described as persistent. Unfortunately an APT can mean a lot of different things to a lot of different people. In truth, an APT can certainly be a number of different things, but regardless of delivery method and payload, APTs generally have the same characteristics. BTB is well versed in the art of the APT and has even developed their own unique tool used during Penetration Testing to demonstrate the risks associated with an APT.- published: 28 Aug 2013
- views: 42
16:04
Countering Advanced Persistent Threats (An interview by FutureGov)
Dr Teow-Hin Ngair, CEO of SecureAge Technology, stresses on the need to go beyond the stan...
published: 01 Jun 2012
author: SecureAge
Countering Advanced Persistent Threats (An interview by FutureGov)
Countering Advanced Persistent Threats (An interview by FutureGov)
Dr Teow-Hin Ngair, CEO of SecureAge Technology, stresses on the need to go beyond the standard anti-virus and firewall to provide integrated data protection ...- published: 01 Jun 2012
- views: 104
- author: SecureAge
69:48
RSA Conference 2011 - Advanced Persistent Threats: War Stories from the Front Lines
Confused by the marketing hype that surrounds APT, the latest buzzword in security? APT is...
published: 08 Sep 2011
author: RSAConference
RSA Conference 2011 - Advanced Persistent Threats: War Stories from the Front Lines
RSA Conference 2011 - Advanced Persistent Threats: War Stories from the Front Lines
Confused by the marketing hype that surrounds APT, the latest buzzword in security? APT is not a botnet, malware code or a new term for cybercrime. What is i...- published: 08 Sep 2011
- views: 2366
- author: RSAConference
12:28
Advanced Persistent Threats (APTs) Part One
Advanced Persistent Threats. APTs are hitting companies that have strong (but standard) se...
published: 15 Mar 2013
author: Jose Bravo
Advanced Persistent Threats (APTs) Part One
Advanced Persistent Threats (APTs) Part One
Advanced Persistent Threats. APTs are hitting companies that have strong (but standard) security controls. There is not a single product that can protect you...- published: 15 Mar 2013
- views: 166
- author: Jose Bravo
2:27
Advanced Persistent Threat Protection - Bit9
Bit9 Chief Technology Officer Harry Sverdlove talks about high profile, highly targeted ad...
published: 06 Jul 2011
author: Bit9Inc
Advanced Persistent Threat Protection - Bit9
Advanced Persistent Threat Protection - Bit9
Bit9 Chief Technology Officer Harry Sverdlove talks about high profile, highly targeted advanced persistent threat/phishing attacks, and the need to remain d...- published: 06 Jul 2011
- views: 1838
- author: Bit9Inc
Youtube results:
57:27
[Presentation] A Pragmatic Approach to Advanced Persistent Threat Protection
http://soph.so/vOpyP Security expert John Shier and senior product specialist Barbara Hud...
published: 15 Apr 2014
[Presentation] A Pragmatic Approach to Advanced Persistent Threat Protection
[Presentation] A Pragmatic Approach to Advanced Persistent Threat Protection
http://soph.so/vOpyP Security expert John Shier and senior product specialist Barbara Hudson explore how today's targeted attacks typically work and what kind of protection is available to help reduce the risk of an attack.- published: 15 Apr 2014
- views: 308
2:49
Protect Your Network from Advanced Persistent Threats
Hear Red Sky Alliance COO and VP of Research and Analysis, Jeff Stutzman, discuss his expe...
published: 29 Nov 2012
author: NormanSecurity
Protect Your Network from Advanced Persistent Threats
Protect Your Network from Advanced Persistent Threats
Hear Red Sky Alliance COO and VP of Research and Analysis, Jeff Stutzman, discuss his experience using Norman's Malware Analyzer G2.- published: 29 Nov 2012
- views: 374
- author: NormanSecurity
3:32
Advanced Persistent Threat Overview Video
This is an Overview video for the "Behind-The-Findings" report on Advanced Persistent Thre...
published: 07 Aug 2013
Advanced Persistent Threat Overview Video
Advanced Persistent Threat Overview Video
This is an Overview video for the "Behind-The-Findings" report on Advanced Persistent Threats, with ESG Senior Analyst Jon Oltsik.- published: 07 Aug 2013
- views: 3
0:41
Stuxnet: Anatomy of a Computer Virus (Motion Graphics)
An infographic dissecting the nature and ramifications of Stuxnet, the first weapon made e...
published: 31 Oct 2012
author: MotionDesignCommun
Stuxnet: Anatomy of a Computer Virus (Motion Graphics)
Stuxnet: Anatomy of a Computer Virus (Motion Graphics)
An infographic dissecting the nature and ramifications of Stuxnet, the first weapon made entirely out of code. This was produced for Australian TV program Hu...- published: 31 Oct 2012
- views: 376
- author: MotionDesignCommun