{"id":3275,"date":"2014-02-20T16:44:59","date_gmt":"2014-02-20T21:44:59","guid":{"rendered":"http:\/\/ibit.temple.edu\/?p=3275"},"modified":"2025-06-12T05:52:10","modified_gmt":"2025-06-12T09:52:10","slug":"barbarians-inside-the-gate-dealing-with-advanced-persistent-threats","status":"publish","type":"post","link":"https:\/\/ibit.temple.edu\/ibit-report\/barbarians-inside-the-gate-dealing-with-advanced-persistent-threats\/","title":{"rendered":"Barbarians Inside the Gate: Dealing With Advanced Persistent Threats"},"content":{"rendered":"<h3><a href=\"http:\/\/ibit.temple.edu\/wp-content\/uploads\/2014\/02\/IBITBarbarians.pdf\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4509 size-full\" src=\"https:\/\/ibit.temple.edu\/wp-content\/uploads\/2014\/02\/BarbariansIBITReport.png\" alt=\"barbariansibitreport\" width=\"604\" height=\"784\" \/><\/a><\/h3>\n<h3>Gregory Senko, Temple University<\/h3>\n<p>January 2014<\/p>\n<p>This IBIT Report describes how the field of information security has evolved from establishing barriers to prevent unauthorized entry to identifying threats from within a company\u2019s own defenses. The ever-increasing sophistication of hackers\u2019 use of malicious software (malware) to elude perimeter security and operate over extended periods creates new challenges for the IT organization. These \u201cAdvanced Persistent Threats\u201d require new approaches and frameworks. To protect against the barbarians inside the gate, the author recommends four transformative steps to achieve more robust enterprise security. Everyone concerned about the safety of their organization\u2019s information assets will want to take note of these recommendations.<\/p>\n<blockquote><p><em><strong>In most corporations, perimeter security management still dominates efforts to protect corporate information assets.<\/strong> <\/em><\/p><\/blockquote>\n<p><a href=\"http:\/\/ibit.temple.edu\/wp-content\/uploads\/2014\/02\/IBITBarbarians.pdf\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/ibit.temple.edu\/wp-content\/uploads\/2010\/02\/DownloadNow.png\" alt=\"Download Now\" width=\"125\" height=\"35\" \/><\/a><\/p>\n<hr \/>\n<p>\u00a9 2014 The IBIT Report, Institute for Business and Information Technology, Fox School of Business, Temple University, Philadelphia, PA 19122, USA. All rights reserved. ISSN 1938-1271.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gregory Senko, Temple University January 2014 This IBIT Report describes how the field of information security has evolved from establishing barriers to prevent unauthorized entry to identifying threats from within a company\u2019s own defenses. The ever-increasing sophistication of hackers\u2019 use of malicious software (malware) to elude perimeter security and operate over extended periods creates new [&hellip;]<\/p>\n","protected":false},"author":1709,"featured_media":4332,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2,1],"tags":[],"class_list":{"0":"post-3275","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-report","8":"category-uncategorized","9":"entry"},"jetpack_featured_media_url":"https:\/\/ibit.temple.edu\/ibit-report\/files\/2014\/02\/barbarians-iStock_000012035081_Large-1.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8vQSu-QP","_links":{"self":[{"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/posts\/3275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/users\/1709"}],"replies":[{"embeddable":true,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/comments?post=3275"}],"version-history":[{"count":1,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/posts\/3275\/revisions"}],"predecessor-version":[{"id":4333,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/posts\/3275\/revisions\/4333"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/media\/4332"}],"wp:attachment":[{"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/media?parent=3275"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/categories?post=3275"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/tags?post=3275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}