|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
A comprehensive guide for cybersecurity professionals to acquire
unique insights on the evolution of the threat landscape and how
you can address modern cybersecurity challenges in your
organisation Key Features Protect your organization from
cybersecurity threats with field-tested strategies Discover the
most common ways enterprises initially get compromised Measure the
effectiveness of your organization's current cybersecurity program
against cyber attacks Book DescriptionAfter scrutinizing numerous
cybersecurity strategies, Microsoft's former Global Chief Security
Advisor in this book helps you understand the efficacy of popular
cybersecurity strategies and more. Cybersecurity Threats, Malware
Trends, and Strategies offers an unprecedented long-term view of
the global threat landscape by examining the twenty-year trend in
vulnerability disclosures and exploitation, nearly a decade of
regional differences in malware infections, the socio-economic
factors that underpin them, and how global malware has evolved.
This will give you further perspectives into malware protection for
your organization. It also examines internet-based threats that
CISOs should be aware of. The book will provide you with an
evaluation of the various cybersecurity strategies that have
ultimately failed over the past twenty years, along with one or two
that have actually worked. It will help executives and security and
compliance professionals understand how cloud computing is a game
changer for them. By the end of this book, you will know how to
measure the effectiveness of your organization's cybersecurity
strategy and the efficacy of the vendors you employ to help you
protect your organization and yourself. What you will learn
Discover cybersecurity strategies and the ingredients critical to
their success Improve vulnerability management by reducing risks
and costs for your organization Learn how malware and other threats
have evolved over the past decade Mitigate internet-based threats,
phishing attacks, and malware distribution sites Weigh the pros and
cons of popular cybersecurity strategies of the past two decades
Implement and then measure the outcome of a cybersecurity strategy
Learn how the cloud provides better security capabilities than
on-premises IT environments Who this book is forThis book is
designed to benefit engineers, leaders, or any professional with
either a responsibility for cyber security within their
organization, or an interest in working in this ever-growing field.
Develop your red team skills by learning essential foundational
tactics, techniques, and procedures, and boost the overall security
posture of your organization by leveraging the homefield advantage
Key Features Build, manage, and measure an offensive red team
program Leverage the homefield advantage to stay ahead of your
adversaries Understand core adversarial tactics and techniques, and
protect pentesters and pentesting assets Book DescriptionIt's now
more important than ever for organizations to be ready to detect
and respond to security events and breaches. Preventive measures
alone are not enough for dealing with adversaries. A well-rounded
prevention, detection, and response program is required. This book
will guide you through the stages of building a red team program,
including strategies and homefield advantage opportunities to boost
security. The book starts by guiding you through establishing,
managing, and measuring a red team program, including effective
ways for sharing results and findings to raise awareness.
Gradually, you'll learn about progressive operations such as
cryptocurrency mining, focused privacy testing, targeting
telemetry, and even blue team tooling. Later, you'll discover
knowledge graphs and how to build them, then become well-versed
with basic to advanced techniques related to hunting for
credentials, and learn to automate Microsoft Office and browsers to
your advantage. Finally, you'll get to grips with protecting assets
using decoys, auditing, and alerting with examples for major
operating systems. By the end of this book, you'll have learned how
to build, manage, and measure a red team program effectively and be
well-versed with the fundamental operational techniques required to
enhance your existing skills. What you will learn Understand the
risks associated with security breaches Implement strategies for
building an effective penetration testing team Map out the
homefield using knowledge graphs Hunt credentials using indexing
and other practical techniques Gain blue team tooling insights to
enhance your red team skills Communicate results and influence
decision makers with appropriate data Who this book is forThis is
one of the few detailed cybersecurity books for penetration
testers, cybersecurity analysts, security leaders and strategists,
as well as red team members and chief information security officers
(CISOs) looking to secure their organizations from adversaries. The
program management part of this book will also be useful for
beginners in the cybersecurity domain. To get the most out of this
book, some penetration testing experience, and software engineering
and debugging skills are necessary.
Insights into the true history of cyber warfare, and the
strategies, tactics, and cybersecurity tools that can be used to
better defend yourself and your organization against cyber threat.
Key Features Define and determine a cyber-defence strategy based on
current and past real-life examples Understand how future
technologies will impact cyber warfare campaigns and society
Future-ready yourself and your business against any cyber threat
Book DescriptionThe era of cyber warfare is now upon us. What we do
now and how we determine what we will do in the future is the
difference between whether our businesses live or die and whether
our digital self survives the digital battlefield. Cyber Warfare -
Truth, Tactics, and Strategies takes you on a journey through the
myriad of cyber attacks and threats that are present in a world
powered by AI, big data, autonomous vehicles, drones video, and
social media. Dr. Chase Cunningham uses his military background to
provide you with a unique perspective on cyber security and
warfare. Moving away from a reactive stance to one that is
forward-looking, he aims to prepare people and organizations to
better defend themselves in a world where there are no borders or
perimeters. He demonstrates how the cyber landscape is growing
infinitely more complex and is continuously evolving at the speed
of light. The book not only covers cyber warfare, but it also looks
at the political, cultural, and geographical influences that
pertain to these attack methods and helps you understand the
motivation and impacts that are likely in each scenario. Cyber
Warfare - Truth, Tactics, and Strategies is as real-life and
up-to-date as cyber can possibly be, with examples of actual
attacks and defense techniques, tools. and strategies presented for
you to learn how to think about defending your own systems and
data. What you will learn Hacking at scale - how machine learning
(ML) and artificial intelligence (AI) skew the battlefield
Defending a boundaryless enterprise Using video and audio as
weapons of influence Uncovering DeepFakes and their associated
attack vectors Using voice augmentation for exploitation Defending
when there is no perimeter Responding tactically to
counter-campaign-based attacks Who this book is forThis book is for
any engineer, leader, or professional with either a responsibility
for cyber security within their organizations, or an interest in
working in this ever-growing field.
Updated and revised edition of the bestselling guide to developing
defense strategies against the latest threats to cybersecurity Key
Features Covers the latest security threats and defense strategies
for 2020 Introduces techniques and skillsets required to conduct
threat hunting and deal with a system breach Provides new
information on Cloud Security Posture Management, Microsoft Azure
Threat Protection, Zero Trust Network strategies, Nation State
attacks, the use of Azure Sentinel as a cloud-based SIEM for
logging and investigation, and much more Book
DescriptionCybersecurity - Attack and Defense Strategies, Second
Edition is a completely revised new edition of the bestselling
book, covering the very latest security threats and defense
mechanisms including a detailed overview of Cloud Security Posture
Management (CSPM) and an assessment of the current threat
landscape, with additional focus on new IoT threats and
cryptomining. Cybersecurity starts with the basics that
organizations need to know to maintain a secure posture against
outside threat and design a robust cybersecurity program. It takes
you into the mindset of a Threat Actor to help you better
understand the motivation and the steps of performing an actual
attack - the Cybersecurity kill chain. You will gain hands-on
experience in implementing cybersecurity using new techniques in
reconnaissance and chasing a user's identity that will enable you
to discover how a system is compromised, and identify and then
exploit the vulnerabilities in your own system. This book also
focuses on defense strategies to enhance the security of a system.
You will also discover in-depth tools, including Azure Sentinel, to
ensure there are security controls in each network layer, and how
to carry out the recovery process of a compromised system. What you
will learn The importance of having a solid foundation for your
security posture Use cyber security kill chain to understand the
attack strategy Boost your organization's cyber resilience by
improving your security policies, hardening your network,
implementing active sensors, and leveraging threat intelligence
Utilize the latest defense tools, including Azure Sentinel and Zero
Trust Network strategy Identify different types of cyberattacks,
such as SQL injection, malware and social engineering threats such
as phishing emails Perform an incident investigation using Azure
Security Center and Azure Sentinel Get an in-depth understanding of
the disaster recovery process Understand how to consistently
monitor security and implement a vulnerability management strategy
for on-premises and hybrid cloud Learn how to perform log analysis
using the cloud to identify suspicious activities, including logs
from Amazon Web Services and Azure Who this book is forFor the IT
professional venturing into the IT security domain, IT pentesters,
security consultants, or those looking to perform ethical hacking.
Prior knowledge of penetration testing is beneficial.
|
|