Cybersecurity Threats,Malware Trends,and Strategies:Mitigate exploits,malware,phishing,and other social engineering attacks


Cybersecurity Threats,Malware Trends,and Strategies:Mitigate exploits,malware,phishing,and other social engineering attacks
by:Tim Rains
pages 页数:428 pages
Publisher Finelybook 出版社:Packt Publishing (29 May 2020)
Language 语言:English
ISBN-10 书号:1800206011
ISBN-13 书号:9781800206014

Book Description
After scrutinizing numerous cybersecurity strategies,Microsoft’s former Global Chief Security Advisor provides unique insights on the evolution of the threat landscape and how enterprises can address modern cybersecurity challenges.
Cybersecurity Threats,Malware Trends,and Strategies shares numerous insights about the threats that both public and private sector organizations face and the cybersecurity strategies that can mitigate them.
The book provides an unprecedented long-term view of the global threat landscape by:examining the twenty-year trend in vulnerability disclosures and exploitation,nearly a decade of regional differences in malware infections,the socio-economic factors that underpin them,and how global malware has evolved. This will give you further perspectives into malware protection for your organization. It also examines internet-based threats that CISOs should be aware of.
The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years,along with one or two that have actually worked. It will help executives and security and compliance professionals understand how cloud computing is a game changer for them.
By the end of this book,you will know how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.
What you will learn

Discover cybersecurity strategies and the ingredients critical to their success
Improve vulnerability management by:reducing risks and costs for your organization
Learn how malware and other threats have evolved over the past decade
Mitigate internet-based threats,phishing attacks,and malware distribution sites
Weigh the pros and cons of popular cybersecurity strategies of the past two decades
Implement and then measure the outcome of a cybersecurity strategy
Learn how the cloud provides better security capabilities than on-premises IT environments
Table of Contents
Preface
Chapter 1:Ingredients for a Successful Cybersecurity Strategy
Chapter 2:Using Vulnerability Trends to Reduce Risk and Costs
Chapter 3:The Evolution of the Threat Landscape-Malware
Chapter 4:Internet-Based Threats
Chapter 5:Cybersecurity Strategies
Chapter 6:Strategy Implementation
Chapter 7:Measuring Performance and Effectiveness
Chapter 8:The Cloud -A Modern Approach to Security and
Compliance
Other Books You May Enjoy
Index

下载地址隐藏内容1积分,请先!没有帐号? 注 册 一个!
觉得文章有用就打赏一下
未经允许不得转载:finelybook » Cybersecurity Threats,Malware Trends,and Strategies:Mitigate exploits,malware,phishing,and other social engineering attacks

评论 抢沙发

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址

觉得文章有用就打赏一下

非常感谢你的打赏,我们将继续给力更多优质内容,让我们一起创建更加美好的网络世界!

支付宝扫一扫打赏

微信扫一扫打赏