|
Showing 1 - 7 of
7 matches in All Departments
Protect your organization from scandalously easy-to-hack MFA
security "solutions" Multi-Factor Authentication (MFA) is spreading
like wildfire across digital environments. However, hundreds of
millions of dollars have been stolen from MFA-protected online
accounts. How? Most people who use multifactor authentication (MFA)
have been told that it is far less hackable than other types of
authentication, or even that it is unhackable. You might be shocked
to learn that all MFA solutions are actually easy to hack. That's
right: there is no perfectly safe MFA solution. In fact, most can
be hacked at least five different ways. Hacking Multifactor
Authentication will show you how MFA works behind the scenes and
how poorly linked multi-step authentication steps allows MFA to be
hacked and compromised. This book covers over two dozen ways that
various MFA solutions can be hacked, including the methods (and
defenses) common to all MFA solutions. You'll learn about the
various types of MFA solutions, their strengthens and weaknesses,
and how to pick the best, most defensible MFA solution for your (or
your customers') needs. Finally, this book reveals a simple method
for quickly evaluating your existing MFA solutions. If using or
developing a secure MFA solution is important to you, you need this
book. Learn how different types of multifactor authentication work
behind the scenes See how easy it is to hack MFA security
solutions--no matter how secure they seem Identify the strengths
and weaknesses in your (or your customers') existing MFA security
and how to mitigate Author Roger Grimes is an internationally known
security expert whose work on hacking MFA has generated significant
buzz in the security world. Read this book to learn what decisions
and preparations your organization needs to take to prevent losses
from MFA hacking.
Avoid becoming the next ransomware victim by taking practical steps
today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list
of ransomware victims is long, distinguished, and sophisticated.
And it's growing longer every day. In Ransomware Protection
Playbook, computer security veteran and expert penetration tester
Roger A. Grimes delivers an actionable blueprint for organizations
seeking a robust defense against one of the most insidious and
destructive IT threats currently in the wild. You'll learn about
concrete steps you can take now to protect yourself or your
organization from ransomware attacks. In addition to walking you
through the necessary technical preventative measures, this
critical book will show you how to: Quickly detect an attack, limit
the damage, and decide whether to pay the ransom Implement a
pre-set game plan in the event of a game-changing security breach
to help limit the reputational and financial damage Lay down a
secure foundation of cybersecurity insurance and legal protection
to mitigate the disruption to your life and business A must-read
for cyber and information security professionals, privacy leaders,
risk managers, and CTOs, Ransomware Protection Playbook is an
irreplaceable and timely resource for anyone concerned about the
security of their, or their organization's, data.
Will your organization be protected the day a quantum computer
breaks encryption on the internet? Computer encryption is vital for
protecting users, data, and infrastructure in the digital age.
Using traditional computing, even common desktop encryption could
take decades for specialized 'crackers' to break and government and
infrastructure-grade encryption would take billions of times
longer. In light of these facts, it may seem that today's computer
cryptography is a rock-solid way to safeguard everything from
online passwords to the backbone of the entire internet.
Unfortunately, many current cryptographic methods will soon be
obsolete. In 2016, the National Institute of Standards and
Technology (NIST) predicted that quantum computers will soon be
able to break the most popular forms of public key cryptography.
The encryption technologies we rely on every day--HTTPS, TLS, WiFi
protection, VPNs, cryptocurrencies, PKI, digital certificates,
smartcards, and most two-factor authentication--will be virtually
useless. . . unless you prepare. Cryptography Apocalypse is a
crucial resource for every IT and InfoSec professional for
preparing for the coming quantum-computing revolution. Post-quantum
crypto algorithms are already a reality, but implementation will
take significant time and computing power. This practical guide
helps IT leaders and implementers make the appropriate decisions
today to meet the challenges of tomorrow. This important book:
Gives a simple quantum mechanics primer Explains how quantum
computing will break current cryptography Offers practical advice
for preparing for a post-quantum world Presents the latest
information on new cryptographic methods Describes the appropriate
steps leaders must take to implement existing solutions to guard
against quantum-computer security threats Cryptography Apocalypse:
Preparing for the Day When Quantum Computing Breaks Today's Crypto
is a must-have guide for anyone in the InfoSec world who needs to
know if their security is ready for the day crypto break and how to
fix it.
Meet the world's top ethical hackers and explore the tools of the
trade Hacking the Hacker takes you inside the world of
cybersecurity to show you what goes on behind the scenes, and
introduces you to the men and women on the front lines of this
technological arms race. Twenty-six of the world's top white hat
hackers, security researchers, writers, and leaders, describe what
they do and why, with each profile preceded by a
no-experience-necessary explanation of the relevant technology.
Dorothy Denning discusses advanced persistent threats, Martin
Hellman describes how he helped invent public key encryption, Bill
Cheswick talks about firewalls, Dr. Charlie Miller talks about
hacking cars, and other cybersecurity experts from around the world
detail the threats, their defenses, and the tools and techniques
they use to thwart the most advanced criminals history has ever
seen. Light on jargon and heavy on intrigue, this book is designed
to be an introduction to the field; final chapters include a guide
for parents of young hackers, as well as the Code of Ethical
Hacking to help you start your own journey to the top.
Cybersecurity is becoming increasingly critical at all levels, from
retail businesses all the way up to national security. This book
drives to the heart of the field, introducing the people and
practices that help keep our world secure. * Go deep into the world
of white hat hacking to grasp just how critical cybersecurity is *
Read the stories of some of the world's most renowned computer
security experts * Learn how hackers do what they do no technical
expertise necessary * Delve into social engineering, cryptography,
penetration testing, network attacks, and more As a field,
cybersecurity is large and multi-faceted yet not historically
diverse. With a massive demand for qualified professional that is
only going to grow, opportunities are endless. Hacking the Hacker
shows you why you should give the field a closer look.
* Shows how to improve Windows desktop and server security by
configuring default security before installing off-the-shelf
security products* Educates readers about the most significant
security threats, building the ultimate defense, operating system
hardening, application security, and automating security* As a
security consultant, the author has an impressive record-of his
clients, not one who followed his recommendations has suffered a
virus, worm, Trojan, or successful hacker attack in the past five
years* The companion Web site includes author-created custom
security templates and group policies that will automate advice
given in the book
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|