{"id":9168,"date":"2015-05-22T14:00:54","date_gmt":"2015-05-22T21:00:54","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9168"},"modified":"2015-05-21T12:23:04","modified_gmt":"2015-05-21T19:23:04","slug":"how-to-architect-for-prevention-against-cyber-adversaries","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/05\/how-to-architect-for-prevention-against-cyber-adversaries\/","title":{"rendered":"How to Architect for Prevention Against Cyber Adversaries"},"content":{"rendered":"<p>Current assumptions are that today\u2019s adversaries move through the cyber attack lifecycle step-by-step, using the most advanced tools, techniques, and tactics to carry out their objectives.\u00a0In reality, there\u2019s no set\u00a0template for every\u00a0advanced attack, and adversaries follow the path of least resistance. Adversaries have the potential to cause irrevocable damage to organizations with even simple, but proven, methods.<\/p>\n<p>Fortunately, breaches can be stopped if organizations and enterprises adopt a threat prevention-based mindset.<!--more--><\/p>\n<p><a href=\"https:\/\/paloaltonetworks.com\/resources\/webcasts\/defeat-pragmatic-adversary.html\" target=\"_blank\">Watch this on-demand webinar<\/a>, hosted by\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/scott-simkin\/\" target=\"_blank\">Scott Simkin<\/a>, that takes a detailed look at the anatomy of\u00a0real\u00a0attacks\u00a0carried out by advanced adversaries, and how to stop these attacks. Specifically, you\u2019ll learn:<\/p>\n<ul>\n<li>What varying\u00a0tools, techniques, and processes advanced attackers are really using<\/li>\n<li>Why you need an intelligence-based approach that stops attacks at every point in the cyber attack lifecycle, no matter what form it takes<\/li>\n<li>How to architect for prevention, while keeping a plan for detection<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Current assumptions are that today\u2019s adversaries move through the cyber attack lifecycle step-by-step, using the most advanced tools, techniques, and tactics to carry out their objectives.\u00a0In reality, there\u2019s no set\u00a0template for every\u00a0advanced &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,108],"tags":[1201,420,97],"coauthors":[716],"class_list":["post-9168","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-threat-prevention-2","tag-cyber-attack-lifecycle","tag-scott-simkin","tag-webinar"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9168"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9168\/revisions"}],"predecessor-version":[{"id":9169,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9168\/revisions\/9169"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9168"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}