product
1236455Cybersecurity Threats, Malware Trends, and Strategieshttps://www.gandhi.com.mx/cybersecurity-threats-malware-trends-and-strategies-second-edition/phttps://gandhi.vtexassets.com/arquivos/ids/987893/a8de7c5f-97fa-48af-9c3d-952e61ac78f3.jpg?v=638337138268670000665739MXNPackt PublishingInStock/Ebooks/1226527Cybersecurity Threats, Malware Trends, and Strategies665739https://www.gandhi.com.mx/cybersecurity-threats-malware-trends-and-strategies-second-edition/phttps://gandhi.vtexassets.com/arquivos/ids/987893/a8de7c5f-97fa-48af-9c3d-952e61ac78f3.jpg?v=638337138268670000InStockMXN99999DIEbook20239781804618950_W3siaWQiOiIxOWIxODk3Yi00YzJkLTQzNjctYjEyYy02N2Q3YmQ1NTRmZTMiLCJsaXN0UHJpY2UiOjczOSwiZGlzY291bnQiOjc0LCJzZWxsaW5nUHJpY2UiOjY2NSwiaW5jbHVkZXNUYXgiOnRydWUsInByaWNlVHlwZSI6Ildob2xlc2FsZSIsImN1cnJlbmN5IjoiTVhOIiwiZnJvbSI6IjIwMjQtMDQtMDhUMTY6MDA6MDBaIiwicmVnaW9uIjoiTVgiLCJpc1ByZW9yZGVyIjpmYWxzZX1d9781804618950_<p><strong>Implement effective cybersecurity strategies to help you and your security team prevent, detect, and respond to modern-day threats</strong></p><h4>Key Features</h4><ul><li>Protect your organization from cybersecurity threats with field-tested strategies</li><li>Understand how extraterritorial regulation, like GDPR, can impact your enterprise cybersecurity program</li><li>Measure the effectiveness of your organizations current cybersecurity program against cyber attacks</li></ul><h4>Book Description</h4><p>Tim Rains is Microsofts former Global Chief Security Advisor and Amazon Web Services former Global Security Leader for Worldwide Public Sector. In this Second Edition of the book, hell help you understand the efficacy of popular cybersecurity strategies using a data-driven approach.</p><p>Cybersecurity Threats, Malware Trends, and Strategies offers you a unique long-term view of the global threat landscape. In the chapters, youll be examining long-term trends in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how the evolution of global malware and the regional differences in malware infections has evolved. Youll also gain valuable insights into the different roles that governments play in cybersecurity and how to mitigate government access to data, which will inform your organizations security and compliance strategies in the ever-evolving regulatory landscape. The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked for enterprise organizations.</p><p>By the end of this book, you will know how to use cyber threat intelligence (CTI) and how to measure the effectiveness of your organizations cybersecurity strategy and the efficacy of the vendors you employ.</p><h4>What you will learn</h4><ul><li>Discover enterprise cybersecurity strategies and the ingredients critical to their success</li><li>Recognize the nuances of cyber threat intelligence (CTI)</li><li>Improve vulnerability management by reducing risks and costs for your organization</li><li>Understand how malware and other threats have evolved over the past decade</li><li>Mitigate internet-based threats, phishing attacks, and malware distribution sites</li><li>Learn the roles that governments play in cybersecurity and how to mitigate government access to data</li><li>Weigh the pros and cons of popular cybersecurity strategies of the past two decades</li><li>Implement and then measure the outcome of a cybersecurity strategy</li><li>Discover how the cloud can provide better security capabilities than on-premises IT environments</li></ul><h4>Who This Book Is For</h4><p>This book is for Chief Information Security Officers (CISOs), aspiring CISOs, Chief Security Officers (CSOs), and cybersecurity professionals looking to improve their organizations cybersecurity strategies to give them the best chances of success. Basic knowledge of Information Technology (IT), software development principles, and cybersecurity concepts is assumed.</p><h4>Table of Contents</h4><ol><li>Introduction</li><li>What to Know About Threat Intelligence</li><li>Vulnerability Disclosure Trends</li><li>The Evolution of Malware</li><li>Internet-Based Threats</li><li>The Roles Governments Play in Cybersecurity</li><li>Government access to data</li><li>Ingredients for a Successful Strategy</li><li>Cybersecurity Strategies</li><li>Strategy Implementation</li><li>Measuring Performance and Effectiveness</li><li>Modern Approaches to Security and Compliance</li></ol>...(*_*)9781804618950_<p><b>Implement effective cybersecurity strategies to help you and your security team protect, detect, and respond to modern-day threats Purchase of the print or Kindle book includes a free eBook in PDF format.</b></p><h2>Key Features</h2><ul><li>Protect your organization from cybersecurity threats with field-tested strategies</li><li>Understand threats such as exploits, malware, internet-based threats, and governments</li><li>Measure the effectiveness of your organizations current cybersecurity program against modern attackers tactics</li></ul><h2>Book Description</h2>Tim Rains is Microsofts former Global Chief Security Advisor and Amazon Web Services former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, youll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. Youll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud. By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organizations cybersecurity strategy.<h2>What you will learn</h2><ul><li>Discover enterprise cybersecurity strategies and the ingredients critical to their success</li><li>Improve vulnerability management by reducing risks and costs for your organization</li><li>Mitigate internet-based threats such as drive-by download attacks and malware distribution sites</li><li>Learn the roles that governments play in cybersecurity and how to mitigate government access to data</li><li>Weigh the pros and cons of popular cybersecurity strategies such as Zero Trust, the Intrusion Kill Chain, and others</li><li>Implement and then measure the outcome of a cybersecurity strategy</li><li>Discover how the cloud can provide better security and compliance capabilities than on-premises IT environments</li></ul><h2>Who this book is for</h2><p>This book is for anyone who is looking to implement or improve their organizations cybersecurity strategy. This includes Chief Information Security Officers (CISOs), Chief Security Officers (CSOs), compliance and audit professionals, security architects, and cybersecurity professionals. Basic knowledge of Information Technology (IT), software development principles, and cybersecurity concepts is assumed.</p>...9781804618950_Packt Publishinglibro_electonico_7d4c1f6c-e6fd-308e-852e-c3d5448bcf26_9781804618950;9781804618950_9781804618950Tim RainsInglésMéxicohttps://getbook.kobo.com/koboid-prod-public/packt-epub-6a9a782f-82b1-46a5-8725-a3d90b2e8689.epub2023-01-25T00:00:00+00:00Packt Publishing