{"id":12536,"date":"2015-09-10T14:00:09","date_gmt":"2015-09-10T17:00:09","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=12536"},"modified":"2015-09-10T13:34:58","modified_gmt":"2015-09-10T16:34:58","slug":"cyber-threat-intelligence-%e2%88%92-how-to-get-ahead-of-cybercrime","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/cyber-threat-intelligence-%e2%88%92-how-to-get-ahead-of-cybercrime\/","title":{"rendered":"Cyber Threat Intelligence \u2212 how to get ahead of cybercrime"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12537\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/09\/Cyber-Threat-Intelligence-\u2212-how-to-get-ahead-of-cybercrime.jpg\" alt=\"Cyber Threat Intelligence \u2212 how to get ahead of cybercrime\" width=\"145\" height=\"205\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/09\/Cyber-Threat-Intelligence-\u2212-how-to-get-ahead-of-cybercrime.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/09\/Cyber-Threat-Intelligence-\u2212-how-to-get-ahead-of-cybercrime-106x150.jpg 106w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Maison d&#8217;\u00e9dition\u00a0Ernst &amp; Young<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> In today\u2019s cybersecurity landscape, it is not possible to prevent all attacks or breaches; today\u2019s attackers have significant funding, are patient and sophisticated, and target vulnerabilities in people and process as well as technology.<\/p>\n<p>With organizations increasingly relying on digitized information and sharing vast amounts of data across the globe, they have become easier targets for many different<br \/>\nforms of attack. As a result, every company\u2019s day-to-day operations, data and intellectual property are seriously at risk. In a corporate context, a cyber attack can<br \/>\nnot only damage your brand and reputation, it can also result in loss of competitive advantage, create legal\/regulatory noncompliance and cause steep financial damage.<\/p>\n<p><a href=\"http:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2015\/09\/EY-cyber-threat-intelligence-how-to-get-ahead-of-cybercrime.pdf\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Maison d&#8217;\u00e9dition\u00a0Ernst &amp; Young R\u00e9sum\u00e9: In today\u2019s cybersecurity landscape, it is not possible to prevent all attacks or breaches; today\u2019s attackers have significant funding, are patient and sophisticated, and target vulnerabilities in people and process as well as technology. With organizations increasingly relying on digitized information and sharing vast amounts of data across the globe, they have become easier targets for many different forms of attack. As a result, every&hellip; <\/p>\n","protected":false},"author":3,"featured_media":12537,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,30,92,6,20,112],"tags":[],"class_list":["post-12536","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-espionagem-e-inteligencia-competitiva","category-trabalho-academico","category-livros","category-seguranca-da-informacao","category-download"],"views":422,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/12536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=12536"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/12536\/revisions"}],"predecessor-version":[{"id":12538,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/12536\/revisions\/12538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/12537"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=12536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=12536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=12536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}