September 9, 2014

The Security Industry's Dirty Little Secret


One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). To assess what IT security professionals understood about AETs, and is being done to stop them, McAfee commissioned a survey 800 CIOs and security managers, finding that more than one in five admits their network was breached (22%)-- and nearly 40% of those breached believe that AETs played a key role. Understanding advanced persistent threats (APTs) and the difference between APTs and AETs will help mitigate the risk to the network and the company.

  • Download Paper
  • More resources from McAfee


  • Leave a comment

    Get E-News and Notices via Email


      

     



      

    I accept Webtorials' Terms and Conditions.

    Trending Discussions

    Featured Sponsor Microsites






















    Recent Tweets

    Archives

    Notices

    Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at https://www.webtorials.com/Sonus_logo.jpgreg/.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

    Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2015, Distributed Networking Associates, Inc.