Book Image

Cybersecurity Threats, Malware Trends, and Strategies

By : Tim Rains
Book Image

Cybersecurity Threats, Malware Trends, and Strategies

By: Tim Rains

Overview of this book

After scrutinizing numerous cybersecurity strategies, Microsoft’s former Global Chief Security Advisor in this book helps you understand the efficacy of popular cybersecurity strategies and more. Cybersecurity Threats, Malware Trends, and Strategies offers an unprecedented long-term view of the global threat landscape by examining the twenty-year trend in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how global malware has evolved. This will give you further perspectives into malware protection for your organization. It also examines internet-based threats that CISOs should be aware of. The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked. It will help executives and security and compliance professionals understand how cloud computing is a game changer for them. By the end of this book, you will know how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.
Table of Contents (11 chapters)
9
Other Books You May Enjoy
10
Index

Chapter summary

CISOs and security teams should select their organization's cybersecurity strategy based on how well it addresses the cybersecurity fundamentals, as the minimum bar. Without examining how their strategy mitigates all the cybersecurity usual suspects, they could be lulling themselves into a false sense of security. The Cybersecurity Fundamentals Scoring System (CFSS) can help security teams determine how well their current or future strategies address the cybersecurity fundamentals.

Of the strategies examined in this chapter, the Attack-Centric Strategy was deemed as the strategy most capable of mitigating the cybersecurity usual suspects and enabling advanced cybersecurity capabilities. The Endpoint Protection Strategy and the Application-Centric Strategy rounded out the top three strategies in this evaluation, but will need to be used in combination with other strategies to fully address the cybersecurity fundamentals.

DevOps is a holistic approach that...