{"id":788,"date":"2015-06-12T21:27:16","date_gmt":"2015-06-13T13:27:16","guid":{"rendered":"http:\/\/vspherestorage.com\/?p=788"},"modified":"2015-06-12T21:27:17","modified_gmt":"2015-06-13T05:27:17","slug":"i-know-youre-not-safe-from-a-cyber-attack","status":"publish","type":"post","link":"https:\/\/vspherestorage.com\/?p=788","title":{"rendered":"I Know You\u2019re Not Safe from a Cyber Attack"},"content":{"rendered":"<p>&#8220;As security sophistication increases, so too does the hacker #toolkit&#8221;<\/p>\n<p><a href='http:\/\/vmw.re\/1KMGgrK' target='_blank'><img src='https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/4880060e-4cc5-458a-a249-8e25f71b5623\/?size=Box320'><\/a><\/p>\n<h4><a href='http:\/\/vmw.re\/1KMGgrK' style='text-decoration: none;' target='_blank'>I Know You\u2019re Not Safe from a Cyber Attack<\/a><\/h4>\n<p>Benjamin Franklin famously said, \u201c&hellip;nothing can be said to be certain, except death and taxes.\u201d I would add enterprise network breaches to that list. If you think \u201ccyber-attacks can\u2019t breach my network security,\u201d or more humbly, \u201cour business isn\u2019t that attractive for hackers,\u201d think again. If you believe your company\u2019s network is foolproof because you have a solid perimeter defense, consider what former FBI Director Robert S. Mueller, III said a couple of years ago: &#8220;,,,I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again&#8230;&#8221; Don\u2019t believe me yet? Talk to the CIOs, CTOs,&#8230;<a href='http:\/\/vmw.re\/1KMGgrK' target='_blank'>Read More<\/a><\/p>\n<hr \/>\n<p><a href='http:\/\/advocacy.vmware.com' target='_blank'>VMware Advocacy<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;As security sophistication increases, so too does the hacker #toolkit&#8221; I Know You\u2019re Not Safe from a Cyber Attack Benjamin Franklin famously said, \u201c&hellip;nothing can be said to be certain, except death and taxes.\u201d I would add enterprise network breaches to that list. If you think \u201ccyber-attacks can\u2019t breach my network security,\u201d or more humbly, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-788","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4m26N-cI","jetpack-related-posts":[{"id":9163,"url":"https:\/\/vspherestorage.com\/?p=9163","url_meta":{"origin":788,"position":0},"title":"Armor Shields Cyber Threats with VMware NSX","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"Armor Shields Cyber Threats with @VMwareNSXArmor Shields Cyber Threats with VMware NSXLearn how Armor, a data security company, shields its 1400+ customers from cyber threats with VMware NSX.VMware Advocacy","rel":"","context":"In &quot;VMware Advocacy&quot;","block_context":{"text":"VMware Advocacy","link":"https:\/\/vspherestorage.com\/?cat=12"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":762,"url":"https:\/\/vspherestorage.com\/?p=762","url_meta":{"origin":788,"position":1},"title":"VMware and Intel safeguard east-west data&#8230;","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"#VMware and #Intel safeguard east-west data centre trafficVMware and Intel safeguard east-west data...Companies integrate McAfee\u2019s Network Security Platform and VMware\u2019s NSX. Intel Security and VMware designed an integrated solution to provide Intelligent IPS to protect east-west traffic within the data centre. The product includes Intel Security's McAfee NSP IPS-VM100-VSS, McAfee\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9938,"url":"https:\/\/vspherestorage.com\/?p=9938","url_meta":{"origin":788,"position":2},"title":"VMware\u2019s Casado warns Congress of&#8230;","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"VMware\u2019s @martin_casado warns Congress of \u201cinsufficient\u201d national cyber defenses #NSXVMware\u2019s Casado warns Congress of...VMware\u2019s networking and security chief Martin Casado \u2013 a forefather of the software defined networking movement \u2013 testified before Congress last week that the country\u2019s cyber security defenses are \u201cinsufficient.\u201dVMware Advocacy","rel":"","context":"In &quot;VMware Advocacy&quot;","block_context":{"text":"VMware Advocacy","link":"https:\/\/vspherestorage.com\/?cat=12"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":14491,"url":"https:\/\/vspherestorage.com\/?p=14491","url_meta":{"origin":788,"position":3},"title":"Schedule these Workspace Security sessions at&#8230;","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"Schedule these Workspace Security sessions at...Stolen credentials, phishing, and exploitation of vulnerabilities are the top three ways that cyber attackers gain access to company networks and information, according to the 2023 Verizon Data Breach Investigations Report. To further complicate the cybersecurity ecosystem: This landscape [...]VMware Social Media Advocacy","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":14495,"url":"https:\/\/vspherestorage.com\/?p=14495","url_meta":{"origin":788,"position":4},"title":"Schedule these Workspace Security sessions at&#8230;","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"Schedule these Workspace Security sessions at...Stolen credentials, phishing, and exploitation of vulnerabilities are the top three ways that cyber attackers gain access to company networks and information, according to the 2023 Verizon Data Breach Investigations Report. To further complicate the cybersecurity ecosystem: This landscape [...]VMware Social Media Advocacy","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":210,"url":"https:\/\/vspherestorage.com\/?p=210","url_meta":{"origin":788,"position":5},"title":"U.S. and Japan to Cooperate on Cybersecurity,&#8230;","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"\"cyberspace has a growing role in ensuring national security\"U.S. and Japan to Cooperate on Cybersecurity,...The United States and Japan have agreed to share resources, information and expertise in response to growing cyber attacks.VMware Advocacy","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/posts\/788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=788"}],"version-history":[{"count":1,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/posts\/788\/revisions"}],"predecessor-version":[{"id":789,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/posts\/788\/revisions\/789"}],"wp:attachment":[{"href":"https:\/\/vspherestorage.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}