Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Venafi > How APT 18 Bypassed Security Controls
 

How APT 18 Bypassed Security Controls

White Paper Published By: Venafi
Venafi
Published:  Jul 27, 2015
Type:  White Paper
Length:  24 pages

Recent Attack Shows the Risk is Real

Now that APT 18 knows their attack works, what will be their next target? Download this white paper to learn how you can protect your business.

  • See how APT 18 conducted its proof-of-concept attack
  • Learn how attackers bypassed critical security controls
  • Find out how you can eliminate blind spots, reduce risk, and respond and remediate faster

Fill out the form on the right to register for this white paper.



Tags : 
security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data, certificate security, trust protection platform