Limit search to available items
Book Cover
E-book
Author Rains, Tim, author.

Title Cybersecurity threats, malware trends, and strategies : discover risk mitigation strategies for modern threats to your organization / Tim Rains ; foreword by Timothy Youngblood
Edition Second edition
Published Birmingham, UK : Packt Publishing Ltd., 2023

Copies

Description 1 online resource (xvi, 555 pages)
Series Expert insight
Expert insight.
Contents Chapter 1: Introduction -- Different types of CISOs: "The CISO Spectrum" -- How organizations get initially compromised and the cybersecurity fundamentals -- Unpatched vulnerabilities -- Security misconfigurations -- Weak, leaked, and stolen credentials -- Social engineering -- Insider threats -- Focus on the cybersecurity fundamentals -- Understanding the difference between attackers' motivations and tactics -- Summary -- References -- Chapter 2: What to Know about Threat Intelligence -- What is threat intelligence?
Where does CTI data come from? -- Using threat intelligence -- The key to using threat intelligence -- Threat intelligence sharing -- CTI sharing protocols -- Traffic Light Protocol -- STIX and TAXII -- Reasons not to share CTI -- How to identify credible cyber threat intelligence -- Data sources -- Time periods -- Recognizing hype -- Predictions about the future -- Vendors' motives -- Summary -- References -- Chapter 3: Using Vulnerability Trends to Reduce Risk and Costs -- Introduction -- Vulnerability Management Primer -- Vulnerability Disclosure Data Sources
Industry Vulnerability Disclosure Trends -- Vendor and Product Vulnerability Trends -- Reducing Risk and Costs -- Measuring Vendor and Product Improvement -- Microsoft Vulnerability Trends -- Oracle Vulnerability Trends -- Google Vulnerability Trends -- Debian Vulnerability Trends -- Apple Vulnerability Trends -- Vendor Vulnerability Trend Summary -- Operating System Vulnerability Trends -- Google Android Vulnerability Trends -- Apple iOS Vulnerability Trends -- Mobile Operating System Summary -- Microsoft Windows 10 Vulnerability Trends -- Apple macOS Vulnerability Trends
Desktop Operating System Summary -- Ubuntu Linux Vulnerability Trends -- Linux Kernel Vulnerability Trends -- Microsoft Windows Server 2016 Vulnerability Trends -- Server Operating System Summary -- Web Browser Vulnerability Trends -- Apple Safari Vulnerability Trends -- Google Chrome Vulnerability Trends -- Web Browser Summary -- Vulnerability Improvement Framework Summary -- Vulnerability Management Guidance -- Summary -- References -- Chapter 4: The Evolution of Malware -- Introduction -- Why is there so much malware on Windows compared to other platforms? -- Data sources
The Malicious Software Removal Tool -- Real-time anti-malware tools -- Non-security data sources -- About malware -- How malware infections spread -- Trojans -- Potentially unwanted software -- Exploits and exploit kits -- Worms -- Ransomware -- Viruses -- Browser modifiers -- Measuring malware prevalence -- Global Windows malware infection analysis -- Regional Windows malware infection analysis -- The threat landscape in the Middle East and Northern Africa -- 10-year regional report card for the Middle East and Northern Africa -- The threat landscape in the European Union and Eastern Europe
Summary Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you'll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You'll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud. By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy
Bibliography Includes bibliographical references and index
Subject Computer security.
Cyberterrorism.
Malware (Computer software)
Computer security
Cyberterrorism
Malware (Computer software)
Genre/Form Electronic books
Form Electronic book
Author Youngblood, Timothy, writer of foreword
ISBN 9781804618950
1804618950