Take a look at the following links to build on the knowledge you've gained from this chapter:
- Sophos: The Future of Cybersecurity: https://secure2.sophos.com/en-us/medialibrary/Gated-Assets/white-papers/sophos-the-future-of-cybersecurity-in-apj.pdf
- 10 Reasons Cyber Range Simulation is Vital to Incident Response: https://securityintelligence.com/articles/10-reasons-cyber-range-simulation-is-vital-to-incident-response/
- Quantum Computing Cyber Threats: https://www.idquantique.com/csa-prepares-enterprises-for-quantum-computing-cybersecurity-threats/
- FireEye Threat Intelligence: https://intelligence.fireeye.com/
- IBM® X-Force Exchange: https://exchange.xforce.ibmcloud.com/
- IntSights | External Threat Protection: https://intsights.com/
- The Leader in Digital Risk Protection | Digital Shadows: https://www.digitalshadows.com/
- Matrix – Enterprise | MITRE ATT&CK: https://attack.mitre.org/matrices/enterprise/
- Endpoint Protection Platform for Enterprises | Endgame...