What Hackers use to Cloak Advanced Persistent Threats

  • Date:9 July 2014
  • Event Type: On Demand Webcast
  • Location:Online

Advanced evasion techniques (AETs) work with advanced persistent threats (APTs) to disguise cyber-attacks in order to avoid detection and blocking by information security systems. AETs enable cybercriminals to deliver malicious content to a vulnerable system, avoiding detection that would normally stop the threat.

In this webcast, learn how network security systems are ineffective against AETs in the same way a stealth fighter can attack without detection by radar or other similar defensive systems.