{"id":31202,"date":"2017-05-23T05:00:59","date_gmt":"2017-05-23T12:00:59","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=31202"},"modified":"2017-05-22T14:13:07","modified_gmt":"2017-05-22T21:13:07","slug":"evasive-security-threats-well-know-adversary","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/05\/evasive-security-threats-well-know-adversary\/","title":{"rendered":"Evasive Security Threats: How Well Do You Know Your Adversary?"},"content":{"rendered":"<p>Malicious actors are more resourceful than ever. They have learned the different techniques and processes used for malware analysis, and have created threats that can evade detection by traditional tools such as antivirus. Sun Tzu\u2019s \u201cThe Art of War\u201d states: \u201cIf you know the enemy and know yourself, you need not fear the result of a hundred battles.\u201d With this in mind, protecting your organization requires both a foundational understanding of highly evasive threats and an updated methodology for malware detection.<\/p>\n<p>Below are links to a few educational resources to equip security teams with greater knowledge about evasive threats and how to prevent them.<\/p>\n<ul>\n<li><a href=\"http:\/\/go.paloaltonetworks.com\/StVWP\"><strong>Read our white paper<\/strong><\/a> \u201cRethink Your Strategy to Defeat Evasive Attacks\u201d for a comprehensive understanding of evasive malware and effective strategies for preventing these advanced threats.<\/li>\n<li><strong><a href=\"http:\/\/go.paloaltonetworks.com\/StVwebinar\">View a recent webinar by Dark Reading and Palo Alto Networks<\/a><\/strong> to learn how outcome-driven threat intelligence can drive automated prevention and operationalized action.<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/videos\/slr\"><strong>Watch the Security Lifecycle Review video<\/strong><\/a> to learn how an SLR can examine your network traffic, provide a comprehensive report on vulnerabilities in your organization\u2019s security posture and recommend actions for remediation.<\/li>\n<\/ul>\n<div class=\"quizz-container\" data-width=\"100%\" data-iframe-title=\"QUIZ: What Kind of Ignite Guardian Are You?\" data-height=\"auto\" data-quiz=\"385597\"><\/div>\n<p><script src=\"\/\/dcc4iyjchzom0.cloudfront.net\/widget\/loader.js\" async><\/script><\/p>\n<p class=\"p2\"><span class=\"s2\"><a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\"><b>Register for Ignite \u201917 Security Conference <\/b><\/a><br \/>\n<i>Vancouver, BC June 12\u201315, 2017<\/i><\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">Ignite \u201917 Security Conference is a live, four-day conference designed for today\u2019s security professionals. Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry. Visit the <a href=\"http:\/\/www.paloaltonetworksignite.com\/\" rel=\"nofollow,noopener\" ><span class=\"s3\">Ignite website<\/span><\/a> for more information on tracks, workshops and marquee sessions.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Evasive security threats: how well do you know your adversary?<\/p>\n","protected":false},"author":226,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[108],"tags":[1057,2158],"coauthors":[2416],"class_list":["post-31202","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threat-prevention-2","tag-prevention","tag-security-lifecycle-review"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/31202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/226"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=31202"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/31202\/revisions"}],"predecessor-version":[{"id":31205,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/31202\/revisions\/31205"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=31202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=31202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=31202"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=31202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}