Learning Resource and Development
Amazon cover image
Image from Amazon.com
Image from Coce

Cybersecurity threats, malware trends, and strategies : discover risk mitigation strategies for modern threats to your organization / Tim Rains.

By: Contributor(s): Material type: TextTextSeries: Expert insightPublisher: Birmingham, United Kingdom : Packt Publishing, 2023Edition: Second editionDescription: xvii, 555 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781804613672
Subject(s): DDC classification:
  • 23 005.8 R136c
LOC classification:
  • QA76.9.A25 .R35 2023
Contents:
Introduction -- What to know about threat intelligence -- Using vulnerability trends to reduce risk and costs -- The evolution of malware -- Internet-based threats -- The roles governments play in cybersecurity -- Government access to data -- Ingredients for a successful cybersecurity strategy -- Cybersecurity strategies -- Strategy implementation -- Measuring performance and effectiveness -- Modern approaches to security and compliance.
Summary: "Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you'll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You'll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud. By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy"-- Back cover.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Books Books Main Library Circulation Section CIR 005.8 R136c 2023 (Browse shelf(Opens below)) 1-4 Available 029328
Books Books Main Library Circulation Section CIR 005.8 R136c 2023 (Browse shelf(Opens below)) 2-4 Available 030237
Books Books Main Library Circulation Section CIR 005.8 R136c 2023 (Browse shelf(Opens below)) 3-4 Available 030238
Books Books Main Library Circulation Section CIR 005.8 R136c 2023 (Browse shelf(Opens below)) 4-4 Available 031409

Includes bibliographical references and index.

Introduction -- What to know about threat intelligence -- Using vulnerability trends to reduce risk and costs -- The evolution of malware -- Internet-based threats -- The roles governments play in cybersecurity -- Government access to data -- Ingredients for a successful cybersecurity strategy -- Cybersecurity strategies -- Strategy implementation -- Measuring performance and effectiveness -- Modern approaches to security and compliance.

"Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you'll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You'll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud. By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy"-- Back cover.

There are no comments on this title.

to post a comment.