{"id":25928,"date":"2023-09-11T15:33:00","date_gmt":"2023-09-11T15:33:00","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=25928"},"modified":"2026-04-17T18:07:40","modified_gmt":"2026-04-17T18:07:40","slug":"insights-from-attack-and-defense-drills-strategies-and-resilience","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/insights-from-attack-and-defense-drills-strategies-and-resilience\/","title":{"rendered":"Insights from Attack and Defense Drills: Strategies and Resilience"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p>Recently, NSFOCUS SOC team summarized the findings from attack and defense drills in the first half of 2023. In these smokeless battles, the attackers advanced with aggressive strategies, while the defenders relied on comprehensive defense systems, taking measures from protecting, monitoring to tracing, and resisting every attempt to breach their defenses.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerability and Asset Impact Analysis<\/h2>\n\n\n\n<p>During these exercises, NSFOCUS SOC team detected and confirmed hundreds of actively exploited vulnerabilities. Zero-day and one-day vulnerabilities increased compared to previous years, but N-day remained dominant.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Actively-exploited-vulnerabilities.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"481\" height=\"289\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Actively-exploited-vulnerabilities.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25931\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Actively-exploited-vulnerabilities.png 481w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Actively-exploited-vulnerabilities-300x180.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Actively-exploited-vulnerabilities-200x120.png 200w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>The Office Automation software and boundary network products were primary targets for vulnerability discovery, accounting for 56%.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Primary-targets-for-vulnerability-digging.png\"><img decoding=\"async\" width=\"481\" height=\"289\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Primary-targets-for-vulnerability-digging.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25933\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Primary-targets-for-vulnerability-digging.png 481w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Primary-targets-for-vulnerability-digging-300x180.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Primary-targets-for-vulnerability-digging-200x120.png 200w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>Many vulnerabilities exposed this year were already known, and vendors had released patches. However, customers who didn&#8217;t update were significantly affected.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Known-vulnerabilities.png\"><img decoding=\"async\" width=\"481\" height=\"289\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Known-vulnerabilities.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25937\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Known-vulnerabilities.png 481w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Known-vulnerabilities-300x180.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Known-vulnerabilities-200x120.png 200w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Defense Strategy in Practice<\/h2>\n\n\n\n<p>Certain tactical characteristics were observed for both attackers and defenders, indicating areas of focus for both parties in the near future:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Organizational knowledge and code repositories remain the main channels for password leaks.<\/li>\n\n\n\n<li>The rise of everything being &acirc;&euro;&oelig;cloud-based&acirc;&euro; introduced new attack vectors.<\/li>\n\n\n\n<li>The software supply chain has increasingly become a weak link in organizational security.<\/li>\n<\/ul>\n\n\n\n<p>&acirc;&euro;&oelig;If you know your enemies and know yourself, you will not be imperiled in battles.&acirc;&euro;  In light of the attack and defense confrontation situation, NSFOCUS provides the following security recommendations:<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#72bf44\"><strong>Optimizing Organizational Security Strategy<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Third-party Product Audit:<\/strong> Organizations should continuously manage and update third-party products, ensuring known security issues are addressed.<\/li>\n\n\n\n<li><strong>Security Awareness Among Personnel:<\/strong> Regularly enhance security awareness and conduct periodic security training and evaluations.<\/li>\n\n\n\n<li><strong>Password Security Optimization:<\/strong> Strengthen the management of weak and repeated passwords to prevent potential security issues.<\/li>\n\n\n\n<li><strong>Manage External Attack Surface:<\/strong> While not impacting the business systems, maintain strict control over external resources to minimize potential attack surfaces.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-color\" style=\"color:#72bf44\"><strong>Security Recommendations for Software Manufacturers<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Real-time Intelligence Sharing:<\/strong> Organizations need to use third-party products during digital construction. Security risks in these products can impact organizational security. Hence, manufacturers should notify customers to promptly patch when updating software security.<\/li>\n\n\n\n<li><strong>Upgrade Management Strategy:<\/strong> Enhance software upgrade management, ensuring issues in older versions are promptly addressed.<\/li>\n\n\n\n<li><strong>Shift-left Security Strategy:<\/strong> Manufacturers should identify vulnerabilities in their products, addressing high-risk issues early to reduce overall threats.<\/li>\n\n\n\n<li><strong>Promotion of <a href=\"https:\/\/nsfocusglobal.com\/pt-br\/key-technologies-for-software-supply-chain-security-detection-technique-part-4-interactive-application-security-testing-iast-and-fuzzing-fuzz-testing\/\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Application Security Testing (IAST)<\/a>:<\/strong> For deep vulnerability checks, IAST products outshine DAST and SAST products. It&#8217;s recommended that developers use IAST tools for in-depth vulnerability inspection, ensuring product security.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-color\" style=\"color:#72bf44\"><strong>Recommendations for Remote Terminal Security Operations<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Regular Review and Update:<\/strong> Regularly verify and ensure deployed agents or tools come from trustworthy, official sources and are updated.<\/li>\n\n\n\n<li><strong>Network Isolation: <\/strong>Try to isolate operational tools from the primary business systems or use dedicated, separate networks for communication to lower potential risks.<\/li>\n\n\n\n<li><strong>Strong Identity Authentication<\/strong>: Ensure only administrators or operators with verified identities can access and use these tools, reducing the risk of malicious exploitation.<\/li>\n\n\n\n<li><strong>Security for operational tools and systems<\/strong> is equally important. Comprehensive and in-depth security reviews and management of all components are vital for an effective organizational security strategy.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Building a secure operation is a critical and ongoing task for organizations. According to &#8220;Liebig&#8217;s law of the minimum,&#8221; the strength of an organization&#8217;s security defense depends on its weakest component. NSFOCUS offers the following recommendations from the perspective of identifying and addressing potential security risks:<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#72bf44\">1.  <strong>Strengthen Access Control and Behavior Audits<\/strong><\/p>\n\n\n\n<p>Implement strict access control policies, ensuring only authorized personnel can access sensitive data and systems. Implement multi-factor authentication, the principle of least privilege, and access log auditing.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#72bf44\">2. <strong>Risk Assessment and Audits<\/strong><\/p>\n\n\n\n<p>Regularly conduct comprehensive security risk assessments and launch a full security check for newly released systems to identify and strengthen potential weak spots.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#72bf44\">3. <strong>Emergency Response Plan<\/strong><\/p>\n\n\n\n<p>Have a structured response plan to calmly address major security incidents.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#72bf44\">4. <strong>Employee Training and Education<\/strong><\/p>\n\n\n\n<p>Continuously provide security training to raise employee awareness about the latest threats and attack techniques. Educate them on identifying and avoiding potential risks, like phishing emails and malicious software downloads.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#72bf44\">5. <strong>Stay Updated on Security Intelligence<\/strong><\/p>\n\n\n\n<p>Build partnerships with security industry leaders to receive the latest security intelligence, techniques, and solutions.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#72bf44\">6. <strong>Establish Hybrid Security <strong>(Cloud and On-Premises)<\/strong> Mechanisms<\/strong><\/p>\n\n\n\n<p>Focus on the security status and risk identification of cloud-based business operations. Develop a mechanism for collaboration between the cloud and the on-premises to have a more comprehensive grasp of the organization&#8217;s cybersecurity status.<\/p>\n\n\n\n<p><\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Recently, NSFOCUS SOC team summarized the findings from attack and defense drills in the first half of 2023. In these smokeless battles, the attackers advanced with aggressive strategies, while the defenders relied on comprehensive defense systems, taking measures from protecting, monitoring to tracing, and resisting every attempt to breach their defenses. Vulnerability and Asset Impact [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":25954,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[357],"class_list":["post-25928","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cybersecurity-insights"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Insights from Attack and Defense Drills: Strategies and Resilience - NSFOCUS<\/title>\n<meta name=\"description\" content=\"Recently, NSFOCUS SOC team summarized the findings from attack and defense drills in the first half of 2023.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insights from Attack and Defense Drills: Strategies and Resilience - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Recently, NSFOCUS SOC team summarized the findings from attack and defense drills in the first half of 2023.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/insights-from-attack-and-defense-drills-strategies-and-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-11T15:33:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/9e40ffcb-3bc7-4836-9d72-2cf1490adc88.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Insights from Attack and Defense Drills: Strategies and Resilience - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Recently, NSFOCUS SOC team summarized the findings from attack and defense drills in the first half of 2023.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/9e40ffcb-3bc7-4836-9d72-2cf1490adc88.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-from-attack-and-defense-drills-strategies-and-resilience\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-from-attack-and-defense-drills-strategies-and-resilience\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Insights from Attack and Defense Drills: Strategies and Resilience\",\"datePublished\":\"2023-09-11T15:33:00+00:00\",\"dateModified\":\"2026-04-17T18:07:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-from-attack-and-defense-drills-strategies-and-resilience\\\/\"},\"wordCount\":724,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-from-attack-and-defense-drills-strategies-and-resilience\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/9e40ffcb-3bc7-4836-9d72-2cf1490adc88.png\",\"keywords\":[\"Cybersecurity Insights\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/insights-from-attack-and-defense-drills-strategies-and-resilience\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-from-attack-and-defense-drills-strategies-and-resilience\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-from-attack-and-defense-drills-strategies-and-resilience\\\/\",\"name\":\"Insights from Attack and Defense Drills: Strategies and Resilience - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-from-attack-and-defense-drills-strategies-and-resilience\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-from-attack-and-defense-drills-strategies-and-resilience\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/9e40ffcb-3bc7-4836-9d72-2cf1490adc88.png\",\"datePublished\":\"2023-09-11T15:33:00+00:00\",\"dateModified\":\"2026-04-17T18:07:40+00:00\",\"description\":\"Recently, NSFOCUS SOC team summarized the findings from attack and defense drills in the first half of 2023.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-from-attack-and-defense-drills-strategies-and-resilience\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/insights-from-attack-and-defense-drills-strategies-and-resilience\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-from-attack-and-defense-drills-strategies-and-resilience\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/9e40ffcb-3bc7-4836-9d72-2cf1490adc88.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/9e40ffcb-3bc7-4836-9d72-2cf1490adc88.png\",\"width\":559,\"height\":238,\"caption\":\"Digital security shield with circuit background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-from-attack-and-defense-drills-strategies-and-resilience\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights from Attack and Defense Drills: Strategies and Resilience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Insights from Attack and Defense Drills: Strategies and Resilience - NSFOCUS","description":"Recently, NSFOCUS SOC team summarized the findings from attack and defense drills in the first half of 2023.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Insights from Attack and Defense Drills: Strategies and Resilience - NSFOCUS","og_description":"Recently, NSFOCUS SOC team summarized the findings from attack and defense drills in the first half of 2023.","og_url":"https:\/\/nsfocusglobal.com\/insights-from-attack-and-defense-drills-strategies-and-resilience\/","og_site_name":"NSFOCUS","article_published_time":"2023-09-11T15:33:00+00:00","article_modified_time":"2026-04-17T18:07:40+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/9e40ffcb-3bc7-4836-9d72-2cf1490adc88.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Insights from Attack and Defense Drills: Strategies and Resilience - NSFOCUS","twitter_description":"Recently, NSFOCUS SOC team summarized the findings from attack and defense drills in the first half of 2023.","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/9e40ffcb-3bc7-4836-9d72-2cf1490adc88.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/insights-from-attack-and-defense-drills-strategies-and-resilience\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/insights-from-attack-and-defense-drills-strategies-and-resilience\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Insights from Attack and Defense Drills: Strategies and Resilience","datePublished":"2023-09-11T15:33:00+00:00","dateModified":"2026-04-17T18:07:40+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/insights-from-attack-and-defense-drills-strategies-and-resilience\/"},"wordCount":724,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/insights-from-attack-and-defense-drills-strategies-and-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/9e40ffcb-3bc7-4836-9d72-2cf1490adc88.png","keywords":["Cybersecurity Insights"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/insights-from-attack-and-defense-drills-strategies-and-resilience\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/insights-from-attack-and-defense-drills-strategies-and-resilience\/","url":"https:\/\/nsfocusglobal.com\/insights-from-attack-and-defense-drills-strategies-and-resilience\/","name":"Insights from Attack and Defense Drills: Strategies and Resilience - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/insights-from-attack-and-defense-drills-strategies-and-resilience\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/insights-from-attack-and-defense-drills-strategies-and-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/9e40ffcb-3bc7-4836-9d72-2cf1490adc88.png","datePublished":"2023-09-11T15:33:00+00:00","dateModified":"2026-04-17T18:07:40+00:00","description":"Recently, NSFOCUS SOC team summarized the findings from attack and defense drills in the first half of 2023.","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/insights-from-attack-and-defense-drills-strategies-and-resilience\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/insights-from-attack-and-defense-drills-strategies-and-resilience\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/insights-from-attack-and-defense-drills-strategies-and-resilience\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/9e40ffcb-3bc7-4836-9d72-2cf1490adc88.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/9e40ffcb-3bc7-4836-9d72-2cf1490adc88.png","width":559,"height":238,"caption":"Digital security shield with circuit background."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/insights-from-attack-and-defense-drills-strategies-and-resilience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Insights from Attack and Defense Drills: Strategies and Resilience"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/25928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=25928"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/25928\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/25954"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=25928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=25928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=25928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}