Like you are up against a ghost where even the best of the firewalls, security sensors, telemetry tools and post incidence protocols are no match to them.
We think like the adversary
identify vulnerabilities and determine how the adversary is likely to infiltrate & what will they likely be seeking