{"id":1149,"date":"2013-09-20T11:50:22","date_gmt":"2013-09-20T11:50:22","guid":{"rendered":"http:\/\/shuyuanmaryho.com\/?p=1149"},"modified":"2013-09-21T19:33:42","modified_gmt":"2013-09-21T19:33:42","slug":"cybersecurity-must-go-beyond-attack-prevention-experts-say","status":"publish","type":"post","link":"https:\/\/shuyuanmaryho.com\/?p=1149","title":{"rendered":"Experts Say Cybersecurity Must Go Beyond Attack Prevention"},"content":{"rendered":"<div class=\"fcbkbttn_buttons_block\" id=\"fcbkbttn_left\"><div class=\"fcbkbttn_button\">\n                            <a href=\"https:\/\/www.facebook.com\/\" target=\"_blank\">\n                                <img decoding=\"async\" src=\"https:\/\/shuyuanmaryho.com\/wp-content\/plugins\/facebook-button-plugin\/images\/standard-facebook-ico.png\" alt=\"Fb-Button\" \/>\n                            <\/a>\n                        <\/div><div class=\"fcbkbttn_like \"><fb:like href=\"https:\/\/shuyuanmaryho.com\/?p=1149\" action=\"like\" colorscheme=\"light\" layout=\"standard\"  width=\"450px\" size=\"small\"><\/fb:like><\/div><\/div><p>A pair of former government officials on Thursday pushed companies to focus less on preventing cyberattacks and more on building systems that allow them to quickly identify and rebound from intrusions, in response to a new survey suggesting current corporate security safeguards aren&#8217;t working.<\/p>\n<p><a href=\"http:\/\/www.law360.com\/technology\/articles\/474111\/cybersecurity-must-go-beyond-attack-prevention-experts-say\">More from Law360.com (free trial subscription required)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A pair of former government officials on Thursday pushed companies to focus less on preventing cyberattacks and more on building systems that allow them to quickly identify and rebound from intrusions, in response to a new survey suggesting current corporate &hellip; <a href=\"https:\/\/shuyuanmaryho.com\/?p=1149\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1149","post","type-post","status-publish","format-standard","hentry","category-the-latest-news-ideas-problems-strategies-and-tactics-in-securing-cyberspace-and-virtual-organizations-discussed-by-experts-in-industries-as-well-as-academia"],"_links":{"self":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/1149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1149"}],"version-history":[{"count":3,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/1149\/revisions"}],"predecessor-version":[{"id":1153,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/1149\/revisions\/1153"}],"wp:attachment":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}