Responding to—and recovering from—sophisticated security attacks

Like so many other things in today’s world, cyber attacks—
along with those who perpetrate them—are becoming more
sophisticated every year. At the same time, IT resources are
moving outside the firewall and enterprises are distributing
their applications and data across multiple devices. It’s now
clear that simply protecting an organization’s perimeter is not
enough. These sophisticated attacks—which include advanced
persistent threats, or APTs—are bypassing traditional defenses.
We know all too well how major security incidents can affect
a company’s data, networks and corporate brand. We also
know that sophisticated attacks, designed to gain continuous
access to critical information or to cause damage in critical
infrastructure, are becoming more severe, more frequent and
more costly.