{"id":55368,"date":"2017-12-20T05:00:28","date_gmt":"2017-12-20T13:00:28","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=55368"},"modified":"2017-12-19T11:24:39","modified_gmt":"2017-12-19T19:24:39","slug":"endpoint-protection-first-line-defense-attacker-mindset","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2017\/12\/endpoint-protection-first-line-defense-attacker-mindset\/","title":{"rendered":"Endpoint Protection: The First Line of Defense Against the Attacker Mindset"},"content":{"rendered":"<p>The rise of digital currencies has made it easier than ever for attackers to convert new threats into profitability. Attackers have designed highly evasive attacks in order to maximize their profitability, resulting in an increase in the volume of successful and sophisticated attacks.<\/p>\n<p>On the front line of these attacks are endpoints, which are highly vulnerable targets for attackers as workforces have become increasingly mobile, distributed and diverse. Organizations need to employ effective endpoint protection that can keep pace with today\u2019s changing threat-landscape \u2013 a prevention-first approach that can stop both known and unknown threats.<\/p>\n<p>The Attacker\u2019s Mindset whitepaper dissects three different real-world attack campaigns, and breaks down how Traps, Palo Alto Networks advanced endpoint protection, thwarts them and similar attacks.<\/p>\n<p><strong><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/attacker-mindset.html\">Read \u201cThe Attacker\u2019s Mindset Insights into real-world attack campaigns\u201d report<\/a>. <\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Endpoint Protection: the first line of defense against the attacker mindset.<\/p>\n","protected":false},"author":226,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[598],"tags":[5118,4078,383],"coauthors":[2416],"class_list":["post-55368","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-endpoint-2","tag-attacker-mindset","tag-endpoint-protection","tag-endpoint-security"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/55368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/226"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=55368"}],"version-history":[{"count":2,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/55368\/revisions"}],"predecessor-version":[{"id":55374,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/55368\/revisions\/55374"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=55368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=55368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=55368"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=55368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}