- Andy Patrizio
Ever since the term advanced persistent threat (APT) burst on the public scene with news ofOperation Aurora carried out against Google and other high-tech companies, allegedly by the Chinese, the security industry and media have flocked around this new type of attack. Many believed we made too much of it, that it wasn't that big a threat or no different than other security threats. Many thought that APT was over-hyped by security vendors seeking fame and fortune and security media types looking for something to write about. But over time APT attacks have come into greater focus and their lifecycle has been studied and understood. We now know that APT is real and how they work. Forewarned is forearmed, and the security industry can now respond.
Perhaps a reason for so much of the controversy and confusion around APT was that until we understood exactly what was happening with these attacks, many attacks were attributed to APTs which were in fact not. This led to confusion and doubt. I recently had a chance to sit down with Mitchell Ashley, my podcasting partner, and Michael Sutton, VP of security research for Zscaler, to discuss APT and clear the air. You can hear the entire 20-minute conversation below.
Zscaler has built the largest security cloud in the world, and so has a tremendous amount of data in terms of malware, endpoint
protection and security analysis and intelligence. Michael Sutton uses all of this to help Zscaler craft its APT defense solution.
The key, according to Sutton, is understanding the lifecycle of the APT.
Recent Software posts | Software Posts Archive