Catalogue

Record Details

Catalogue Search


Back To Results
Showing Item 9 of 50

Cybersecurity threats, malware trends, and strategies : discover risk mitigation strategies for modern threats to your organization  Cover Image E-book E-book

Cybersecurity threats, malware trends, and strategies : discover risk mitigation strategies for modern threats to your organization

Rains, Tim (author.). Youngblood, Timothy, (writer of foreword.).

Summary: Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you'll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You'll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud. By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.

Record details

  • ISBN: 9781804613672
  • Physical Description: 1 online resource (584 pages)
    remote
  • Edition: Second edition.
  • Publisher: Birmingham, UK : Packt Publishing Ltd., [2023]

Content descriptions

Bibliography, etc. Note: Includes bibliographical references and index.
Formatted Contents Note: The Malicious Software Removal Tool -- Real-time anti-malware tools -- Non-security data sources -- About malware -- How malware infections spread -- Trojans -- Potentially unwanted software -- Exploits and exploit kits -- Worms -- Ransomware -- Viruses -- Browser modifiers -- Measuring malware prevalence -- Global Windows malware infection analysis -- Regional Windows malware infection analysis -- The threat landscape in the Middle East and Northern Africa -- 10-year regional report card for the Middle East and Northern Africa -- The threat landscape in the European Union and Eastern Europe
Subject: Computer security
Cyberterrorism
Malware (Computer software)
Genre: Electronic books.

Back To Results
Showing Item 9 of 50

Additional Resources