0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Cybersecurity Threats, Malware Trends, and Strategies - - Discover risk mitigation strategies for modern threats in your organization (Paperback, 2nd Revised edition) Loot Price: R1,103
Discovery Miles 11 030
Cybersecurity Threats, Malware Trends, and Strategies - - Discover risk mitigation strategies for modern threats in your...

Cybersecurity Threats, Malware Trends, and Strategies - - Discover risk mitigation strategies for modern threats in your organization (Paperback, 2nd Revised edition)

Tim Rains

 (sign in to rate)
Loot Price R1,103 Discovery Miles 11 030 | Repayment Terms: R103 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

Implement effective cybersecurity strategies to help you and your security team prevent, detect, and respond to modern-day threats Key Features * Protect your organization from cybersecurity threats with field-tested strategies * Understand how extraterritorial regulation, like GDPR, can impact your enterprise cybersecurity program * Measure the effectiveness of your organization's current cybersecurity program against cyber attacks Book Description Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. In this Second Edition of the book, he'll help you understand the efficacy of popular cybersecurity strategies using a data-driven approach. Cybersecurity Threats, Malware Trends, and Strategies offers you a unique long-term view of the global threat landscape. In the chapters, you'll be examining long-term trends in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how the evolution of global malware and the regional differences in malware infections has evolved. You'll also gain valuable insights into the different roles that governments play in cybersecurity and how to mitigate government access to data, which will inform your organization's security and compliance strategies in the ever-evolving regulatory landscape. The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked for enterprise organizations. By the end of this book, you will know how to use cyber threat intelligence (CTI) and how to measure the effectiveness of your organization's cybersecurity strategy and the efficacy of the vendors you employ. What you will learn * Discover enterprise cybersecurity strategies and the ingredients critical to their success * Recognize the nuances of cyber threat intelligence (CTI) * Improve vulnerability management by reducing risks and costs for your organization * Understand how malware and other threats have evolved over the past decade * Mitigate internet-based threats, phishing attacks, and malware distribution sites * Learn the roles that governments play in cybersecurity and how to mitigate government access to data * Weigh the pros and cons of popular cybersecurity strategies of the past two decades * Implement and then measure the outcome of a cybersecurity strategy * Discover how the cloud can provide better security capabilities than on-premises IT environments Who This Book Is For This book is for Chief Information Security Officers (CISOs), aspiring CISOs, Chief Security Officers (CSOs), and cybersecurity professionals looking to improve their organizations' cybersecurity strategies to give them the best chances of success. Basic knowledge of Information Technology (IT), software development principles, and cybersecurity concepts is assumed.

General

Imprint: Packt Publishing Limited
Country of origin: United Kingdom
Release date: 2023
Authors: Tim Rains
Dimensions: 93 x 75mm (L x W)
Format: Paperback
Pages: 380
Edition: 2nd Revised edition
ISBN-13: 978-1-80461-367-2
Categories: Books > Computing & IT > Computer communications & networking > Network security
Promotions
LSN: 1-80461-367-3
Barcode: 9781804613672

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,739 R1,389 Discovery Miles 13 890
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,420 R1,316 Discovery Miles 13 160
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,916 Discovery Miles 19 160
PCI Dss: A Pocket Guide
IT Governance Paperback R417 Discovery Miles 4 170
Two-Factor Authentication
Mark Stanislav Paperback R534 Discovery Miles 5 340
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R683 Discovery Miles 6 830
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,724 Discovery Miles 67 240
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,432 Discovery Miles 64 320
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,410 Discovery Miles 84 100
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R6,432 Discovery Miles 64 320

See more

Partners