Book Image

Cybersecurity Threats, Malware Trends, and Strategies - Second Edition

By : Tim Rains
3 (2)
Book Image

Cybersecurity Threats, Malware Trends, and Strategies - Second Edition

3 (2)
By: Tim Rains

Overview of this book

Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services’ former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you’ll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You’ll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud. By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.
Table of Contents (15 chapters)
13
Other Books You May Enjoy
14
Index

Using cybersecurity strategies in the cloud

In Chapter 9, Cybersecurity Strategies, we examined several cybersecurity strategies that I have seen employed in the industry over the past two decades. We evaluated these strategies using the Cybersecurity Fundamentals Scoring System (CFSS). The CFSS score estimate for each strategy helps us understand how well they address the Cybersecurity Fundamentals. To refresh your memory, a summary of the CFSS scores for each strategy is provided in Figure 12.1.

Table  Description automatically generated

Figure 12.1: CFSS score estimate summary

Almost any of these strategies can be used in the cloud. Let’s look at a few of these strategies in the context of the cloud.

Using the Protect and Recover Strategy in the cloud

CSPs offer granular firewall and network controls that can help organizations adopt and operate the Protect and Recover Strategy. The power of APIs and automation in the cloud enables Network teams and Security teams to provision and operate Web...