{"id":3174,"date":"2017-02-10T06:40:14","date_gmt":"2017-02-10T11:40:14","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/?p=3174"},"modified":"2017-02-10T06:41:36","modified_gmt":"2017-02-10T11:41:36","slug":"3174","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/2017\/02\/10\/3174\/","title":{"rendered":""},"content":{"rendered":"<p style=\"text-align: center\">This is an interesting article about fileless memory that does not need to be downloaded to a hard drive. It runs in the kernel or RAM without downloading any payload to the hard drive. Therefore, it could go undetected by traditional AV software.<\/p>\n<p>This highlights the importance of having a defense in depth strategy that monitors activity on the network and endpoints, enforces strong access management, prevents data leakage, enforces a strong perimeter, etc. If a company or bank is relying solely on AV software to detect and remove malware, they will struggle to defend against today&#8217;s threats.<\/p>\n<p>https:\/\/www.wired.com\/2017\/02\/say-hello-super-stealthy-malware-thats-going-mainstream\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is an interesting article about fileless memory that does not need to be downloaded to a hard drive. It runs in the kernel or RAM without downloading any payload to the hard drive. Therefore, it could go undetected by traditional AV software. This highlights the importance of having a defense in depth strategy that [&hellip;]<\/p>\n","protected":false},"author":11274,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[715345],"tags":[],"class_list":{"0":"post-3174","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-04-enterprise-architecture","7":"entry"},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/s8j0Bl-3174","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/users\/11274"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/comments?post=3174"}],"version-history":[{"count":2,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3174\/revisions"}],"predecessor-version":[{"id":3176,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3174\/revisions\/3176"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/media?parent=3174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/categories?post=3174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/tags?post=3174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}