Free shipping on orders over $99
Cybersecurity Threats, Malware Trends, and Strategies

Cybersecurity Threats, Malware Trends, and Strategies

Discover risk mitigation strategies for modern threats to your organization

by Tim Rains
Paperback
Publication Date: 25/01/2023

Share This Book:

  $68.19
or 4 easy payments of $17.05 with
afterpay
Implement effective cybersecurity strategies to help you and your security team protect, detect, and respond to modern-day threats

Key Features

* Protect your organization from cybersecurity threats with field-tested strategies
* Understand threats such as exploits, malware, internet-based threats, and governments
* Measure the effectiveness of your organization's current cybersecurity program against modern attackers' tactics

Book Description

Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies.
Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many CISOs, aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you'll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You'll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud.
By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.

What you will learn

* Discover enterprise cybersecurity strategies and the ingredients critical to their success
* Improve vulnerability management by reducing risks and costs for your organization
* Mitigate internet-based threats such as drive-by download attacks and malware distribution sites
* Learn the roles that governments play in cybersecurity and how to mitigate government access to data
* Weigh the pros and cons of popular cybersecurity strategies such as Zero Trust, the Intrusion Kill Chain, and others
* Implement and then measure the outcome of a cybersecurity strategy
* Discover how the cloud can provide better security and compliance capabilities than on-premises IT environments

Who This Book Is For

This book is for anyone who is looking to implement or improve their organization's cybersecurity strategy. This includes Chief Information Security Officers (CISOs), Chief Security Officers (CSOs), compliance and audit professionals, security architects, and cybersecurity professionals. Basic knowledge of Information Technology (IT), software development principles, and cybersecurity concepts is assumed.
ISBN:
9781804613672
9781804613672
Category:
Network security
Format:
Paperback
Publication Date:
25-01-2023
Publisher:
Packt Publishing Limited
Country of origin:
United Kingdom
Edition:
2nd Edition
Pages:
584
Dimensions (mm):
235x191mm

This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.

Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.

Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:

ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days

Reviews

Be the first to review Cybersecurity Threats.