Research Library > Venafi > How APT 18 Bypassed Security Controls

How APT 18 Bypassed Security Controls

Published By: Venafi
Venafi
Published:  Jul 27, 2015
Length:  24 pages

Recent Attack Shows the Risk is Real

Now that APT 18 knows their attack works, what will be their next target? Download this white paper to learn how you can protect your business.

  • See how APT 18 conducted its proof-of-concept attack
  • Learn how attackers bypassed critical security controls
  • Find out how you can eliminate blind spots, reduce risk, and respond and remediate faster

Fill out the form on the right to register for this white paper.



Tagssecurity controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data, certificate security, trust protection platform, application security, disaster recovery, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, network security appliance, vulnerability management