Cybersecurity Threats, Malware Trends, and Strategies : Learn to Mitigate Exploits, Malware, Phishing, and Other Social Engineering Attacks
Tim Rains

A comprehensive guide for cybersecurity professionals to acquire unique insights on the evolution of the threat landscape and how you can address modern cybersecurity challenges in your organisationKey FeaturesProtect your organization from cybersecurity threats with field-tested strategiesDiscover the most common ways enterprises initially get compromisedMeasure the effectiveness of your organization's current cybersecurity program against cyber attacksBook DescriptionAfter scrutinizing numerous cybersecurity strategies, Microsoft's former Global Chief Security Advisor in this book helps you understand the efficacy of popular cybersecurity strategies and more.Cybersecurity Threats, Malware Trends, and Strategies offers an unprecedented long-term view of the global threat landscape by examining the twenty-year trend in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how global malware has evolved. This will give you further perspectives into malware protection for your organization. It also examines internet-based threats that CISOs should be aware of.The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked. It will help executives and security and compliance professionals understand how cloud computing is a game changer for them.By the end of this book, you will know how to measure the effectiveness of your organization's cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.What you will learnDiscover cybersecurity strategies and the ingredients critical to their successImprove vulnerability management by reducing risks and costs for your organizationLearn how malware and other threats have evolved over the past decadeMitigate internet-based threats, phishing attacks, and malware distribution sitesWeigh the pros and cons of popular cybersecurity strategies of the past two decadesImplement and then measure the outcome of a cybersecurity strategyLearn how the cloud provides better security capabilities than on-premises IT environmentsWho this book is forThis book is designed to benefit engineers, leaders, or any professional with either a responsibility for cyber security within their organization, or an interest in working in this ever-growing field.

Издательство:
Packt Publishing
Год издания:
2020
ISBN:
978-1-8002-0601-4
ISBN:
978-1-8002-0589-5

Полный текст книги доступен студентам и сотрудникам МФТИ через Личный кабинет https://profile.mipt.ru/services/.

После авторизации пройдите по ссылке «Books.mipt.ru Электронная библиотека МФТИ»