A few years ago, a point-product security vendor proudly declared their technology was the silver bullet that stopped all security threats from penetrating the corporate network. Many of us in the industry raised our collective eyebrows in surprise at such a bold claim.\nWhile the naive or inexperienced might have believed such an outrageous claim, we all knew there is no such thing as a silver bullet in security and that no matter how cutting edge or sophisticated your security is, attacks\u00a0will get through and it is only a matter of time before any organization is compromised. The latest NSS Labs Report on Cyber Resilience\u00a0addresses this silver bullet fairy tale head on, highlighting that it\u2019s not the 98 percent of threats security defenses catch which organizations must be concerned about, it\u2019s the two percent of threats defenses miss which can often lead to the beginnings of a breach.\nAs we know, it\u2019s no longer a matter of\u00a0if\u00a0your organization will be attacked, it\u2019s a matter of when. Which is why organizations today require a simple, scalable, and threat-focused model to ensure visibility across the entire attack continuum\u2014before, during, and after an attack.\nSlideshare with highlights from webcast on Cyber Resilience with NSS Labs\n\n\n \n Future of IT Podcast: Becoming Cyber Resilient in Today\u2019s Internet of Everything Landscape from Cisco Business Insights\n\n\n\nPodcast sharing highlights from\u00a0webcast on Cyber Resilience with NSS Labs\nThe NSS Labs Report goes a step further in reinforcing these principles. Some of the key findings and recommendations from the report include:\n\nLearn to anticipate attacks. Assume the breach will occur, and focus on reducing its potential impact.\nSecurity controls should be viewed not as complete protection against attack, but rather as a means of maneuvering the adversary into attacking a target of the organization\u2019s choosing, and also as a means of proactively managing the impact of network penetrations.\nPrepare to operate at 60 percent capacity in order to withstand a breach which will reduce but not eliminate critical services.\nPlan for flexible network architectures that will allow dynamic provisioning of critical resources to isolate and replace infected portions of the network.\n\nThe report conclusion that architectures must be based on the assumption that systems will be compromised and businesses must continue to function is one that aligns to the model that Cisco recommends customers adopt. Additionally, for organizations to be prepared to operate at 60 percent capacity to withstand a breach brings significant business implications including\u00a0reduced critical services which may well translate into\u00a0lost capacity and revenue.\nToday\u2019s enterprise security teams need to look at their defenses with the eyes of the attackers and not assume their security will protect against every sort of attack. After all today\u2019s attackers look for weaknesses in existing defenses \u2013 chinks in the armor \u2013 and these findings highlight the importance of staying a step ahead by adopting defenses that address modern threats and gaps in traditional solutions with threat-focused protection that offers full visibility and delivers integrated threat defense for the entire attack continuum.\u00a0 There\u2019s no better time than now to embrace a model that is threat-centric and to move to an integrated approach that delivers full contextual awareness and dynamic controls that automatically assess all threats, correlate intelligence, and optimize defenses to protect modern enterprise networks.