Book Image

Cybersecurity Threats, Malware Trends, and Strategies - Second Edition

By : Tim Rains
3 (2)
Book Image

Cybersecurity Threats, Malware Trends, and Strategies - Second Edition

3 (2)
By: Tim Rains

Overview of this book

Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services’ former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you’ll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You’ll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud. By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.
Table of Contents (15 chapters)
13
Other Books You May Enjoy
14
Index

Index

A

Actions on Objectives

ATT&CK, insights 455-457

controls, examples 454

Address Resolution Protocol (ARP) 135

Address Space Layout Randomization (ASLR) 415

advanced cybersecurity capabilities 313

Advanced Encryption Standard (AES) 529

Advanced Persistent Threat (APT) 10, 524

adversary emulation plans

reference link 490

anti-malware solutions

ability, debate 183, 184

Anti-Phishing Working Group (APWG) 198

Apple iOS 123

versus Google Android 93

Apple iOS vulnerability trends 91, 92

Apple macOS

versus Microsoft Windows 10 97

Apple macOS vulnerability trends 95-97

Apple Safari vulnerability trends 103, 104

Apple vulnerability trends 83-85

application-centric strategy 359, 360

advantages 361

CFSS score estimate 361

disadvantages 362

Application Programming Interfaces (APIs) 503

example 503-508

App Store 123

APWG Phishing Activity Trends Report 199

Artificial...