Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Cybersecurity Threats, Malware Trends, and Strategies - - Discover risk mitigation strategies for modern threats in your organization (Paperback, 2nd Revised edition)
Loot Price: R1,110
Discovery Miles 11 100
|
|
Cybersecurity Threats, Malware Trends, and Strategies - - Discover risk mitigation strategies for modern threats in your organization (Paperback, 2nd Revised edition)
Expected to ship within 10 - 15 working days
|
Implement effective cybersecurity strategies to help you and your
security team prevent, detect, and respond to modern-day threats
Key Features * Protect your organization from cybersecurity threats
with field-tested strategies * Understand how extraterritorial
regulation, like GDPR, can impact your enterprise cybersecurity
program * Measure the effectiveness of your organization's current
cybersecurity program against cyber attacks Book Description Tim
Rains is Microsoft's former Global Chief Security Advisor and
Amazon Web Services' former Global Security Leader for Worldwide
Public Sector. In this Second Edition of the book, he'll help you
understand the efficacy of popular cybersecurity strategies using a
data-driven approach. Cybersecurity Threats, Malware Trends, and
Strategies offers you a unique long-term view of the global threat
landscape. In the chapters, you'll be examining long-term trends in
vulnerability disclosures and exploitation, nearly a decade of
regional differences in malware infections, the socio-economic
factors that underpin them, and how the evolution of global malware
and the regional differences in malware infections has evolved.
You'll also gain valuable insights into the different roles that
governments play in cybersecurity and how to mitigate government
access to data, which will inform your organization's security and
compliance strategies in the ever-evolving regulatory landscape.
The book will provide you with an evaluation of the various
cybersecurity strategies that have ultimately failed over the past
twenty years, along with one or two that have actually worked for
enterprise organizations. By the end of this book, you will know
how to use cyber threat intelligence (CTI) and how to measure the
effectiveness of your organization's cybersecurity strategy and the
efficacy of the vendors you employ. What you will learn * Discover
enterprise cybersecurity strategies and the ingredients critical to
their success * Recognize the nuances of cyber threat intelligence
(CTI) * Improve vulnerability management by reducing risks and
costs for your organization * Understand how malware and other
threats have evolved over the past decade * Mitigate internet-based
threats, phishing attacks, and malware distribution sites * Learn
the roles that governments play in cybersecurity and how to
mitigate government access to data * Weigh the pros and cons of
popular cybersecurity strategies of the past two decades *
Implement and then measure the outcome of a cybersecurity strategy
* Discover how the cloud can provide better security capabilities
than on-premises IT environments Who This Book Is For This book is
for Chief Information Security Officers (CISOs), aspiring CISOs,
Chief Security Officers (CSOs), and cybersecurity professionals
looking to improve their organizations' cybersecurity strategies to
give them the best chances of success. Basic knowledge of
Information Technology (IT), software development principles, and
cybersecurity concepts is assumed.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|