Best practices series: Implementing advanced threat detection
Panel discussion about multi-cloud backup challenges


When it comes to security, anything can get you -- the known knowns, the known unknowns, and the unknown unknowns. The first category hurts when you don't install, or accidentally turn off, the fingerprint-detecting basics like firewalls and antivirus. The known unknowns can be stopped by pattern-based tools.
It's the unknown unknowns that get tricky. These tend to come from advanced persistent threats (APTs) -- actors like nation states and criminal organizations, although any bad actor with some talent and inspiration can create an advanced threat, defined as an attack that doesn't conform to existing attack patterns.
Click Download now, to watch the panel discussion with experts debating top challenges of multi-cloud backup, discussing key considerations for procedures and tools, and exploring lessons and implications from real-world customer stories.
In this EcoCast, we'll look at how common these advanced threats are, and hear from top experts at leading security companies on how to prevent them. Don't miss this opportunity to close a critical gap in many organizations' defenses.
Download now to:
- Discover cutting-edge threat detection technologies
- Learn effective threat mitigation strategies
- Gain actionable insights for immediate implementation
Provided by Sysdig
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
The top ransomware trends in 2025
In-depth A splintering of top groups and changing attitudes toward payments are changing attacker tactics at speed
-
Should workers prepare to become AI agent bosses?
In-depth Tech leaders claim employees could soon be managing AI agents – but this will require a huge culture shift, security awareness and governance
-
Microsoft and Cloudflare just took down a major phishing operation
News RaccoonO365’s phishing as a service platform has risen to prominence via Telegram
-
Cyber professionals are losing sleep over late night attacks
News Hackers are biding their time and launching attacks when businesses can’t respond
-
BreachForums founder resentenced to three years in prison
News A US appeals court vacated his previous sentence and remanded the case for resentencing
-
Jaguar Land Rover says IT disruption set to continue
News The automotive manufacturer is still not fully operational after the recent cyber attack
-
Nearly 700,000 customers impacted after insider attack at US fintech firm
News FinWise, which provides loans on behalf of US financial services firms, revealed a former employee accessed sensitive customer information after leaving the firm.
-
How to check if you’ve been affected by Salesforce attacks – and stop hackers dead in their tracks
News The FBI has issued a fresh advisory over the threat posed to Salesforce customers by two threat groups. Here's how you can stay safe and mitigate any risks.
-
Kids hacking for kicks are causing security headaches at schools
News More than half of cyber incidents at schools are caused by students, with some tech-savvy pupils attempting to bypass security and network controls.
-
Mobile app security is a huge blind spot for developer teams – 93% are confident their applications are secure, but 62% reported breaches last year
News Organizations are overconfident about their mobile app security practices, according to new research, and it’s putting enterprises and consumers alike at risk.