0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Cybersecurity Threats, Malware Trends, and Strategies - - Discover risk mitigation strategies for modern threats in your organization (Paperback, 2nd Revised edition) Loot Price: R1,110
Discovery Miles 11 100
Cybersecurity Threats, Malware Trends, and Strategies - - Discover risk mitigation strategies for modern threats in your...

Cybersecurity Threats, Malware Trends, and Strategies - - Discover risk mitigation strategies for modern threats in your organization (Paperback, 2nd Revised edition)

Tim Rains

 (sign in to rate)
Loot Price R1,110 Discovery Miles 11 100 | Repayment Terms: R104 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

Implement effective cybersecurity strategies to help you and your security team prevent, detect, and respond to modern-day threats Key Features * Protect your organization from cybersecurity threats with field-tested strategies * Understand how extraterritorial regulation, like GDPR, can impact your enterprise cybersecurity program * Measure the effectiveness of your organization's current cybersecurity program against cyber attacks Book Description Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. In this Second Edition of the book, he'll help you understand the efficacy of popular cybersecurity strategies using a data-driven approach. Cybersecurity Threats, Malware Trends, and Strategies offers you a unique long-term view of the global threat landscape. In the chapters, you'll be examining long-term trends in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how the evolution of global malware and the regional differences in malware infections has evolved. You'll also gain valuable insights into the different roles that governments play in cybersecurity and how to mitigate government access to data, which will inform your organization's security and compliance strategies in the ever-evolving regulatory landscape. The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked for enterprise organizations. By the end of this book, you will know how to use cyber threat intelligence (CTI) and how to measure the effectiveness of your organization's cybersecurity strategy and the efficacy of the vendors you employ. What you will learn * Discover enterprise cybersecurity strategies and the ingredients critical to their success * Recognize the nuances of cyber threat intelligence (CTI) * Improve vulnerability management by reducing risks and costs for your organization * Understand how malware and other threats have evolved over the past decade * Mitigate internet-based threats, phishing attacks, and malware distribution sites * Learn the roles that governments play in cybersecurity and how to mitigate government access to data * Weigh the pros and cons of popular cybersecurity strategies of the past two decades * Implement and then measure the outcome of a cybersecurity strategy * Discover how the cloud can provide better security capabilities than on-premises IT environments Who This Book Is For This book is for Chief Information Security Officers (CISOs), aspiring CISOs, Chief Security Officers (CSOs), and cybersecurity professionals looking to improve their organizations' cybersecurity strategies to give them the best chances of success. Basic knowledge of Information Technology (IT), software development principles, and cybersecurity concepts is assumed.

General

Imprint: Packt Publishing Limited
Country of origin: United Kingdom
Release date: 2023
Authors: Tim Rains
Dimensions: 93 x 75mm (L x W)
Format: Paperback
Pages: 380
Edition: 2nd Revised edition
ISBN-13: 978-1-80461-367-2
Categories: Books > Computing & IT > Computer communications & networking > Network security
Promotions
LSN: 1-80461-367-3
Barcode: 9781804613672

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,704 R1,343 Discovery Miles 13 430
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,248 R1,109 Discovery Miles 11 090
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,405 Discovery Miles 24 050
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,432 R1,187 Discovery Miles 11 870
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,859 Discovery Miles 18 590
PCI Dss: A Pocket Guide
IT Governance Paperback R375 Discovery Miles 3 750
Two-Factor Authentication
Mark Stanislav Paperback R489 Discovery Miles 4 890
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R650 Discovery Miles 6 500
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,847 Discovery Miles 68 470
CISSP Passport
Bobby Rogers Paperback R610 Discovery Miles 6 100
Introduction to Computer Security…
Michael Goodrich, Roberto Tamassia Paperback R2,361 Discovery Miles 23 610
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,595 Discovery Miles 85 950

See more

Partners