Advanced Persistent Threats: Calling The Hackers' Bluffs

A hacker’s ideal effort is a simple “smash-and-grab” hack, but an APT requires steps that demand they remain undetected for as long as it takes to find and exfiltrate the desired data.