Security News > 2020 > July > Review: Cybersecurity Threats, Malware Trends, and Strategies
He starts the book by explaining the importance of a cybersecurity strategy and why it should be implemented, but also how security leaders should search for knowledge from the past by using vulnerability disclosure data to help them build their own strategy and avoid making mistakes that others have already made.
Only by knowing their variety and frequency it is possible to define an efficient cybersecurity strategy.
The author uses the Cybersecurity Fundamentals Scoring System to evaluate the efficiency of every cybersecurity strategy, explaining them in detail and pointing out advantages and disadvantages.
The final chapter is dedicated to the cloud and why it is the best choice for enterprises to mitigate common risks, and the best tools cybersecurity teams can use to protect cloud data.
The book is mainly aimed at CISOs, CIOs, CTOs but also others responsible for the cybersecurity of their organization, presuming they have basic IT knowledge.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/b9PtnpJ5fpM/
Related news
- THN Cybersecurity Recap: Top Threats and Trends (Sep 30 - Oct 6) (source)
- OpenAI confirms threat actors use ChatGPT to write malware (source)
- THN Cybersecurity Recap: Top Threats, Tools and Trends (Oct 7 - Oct 13) (source)
- THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 - Oct 20) (source)
- THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21 - Oct 27) (source)
- Everything You Need to Know about the Malvertising Cybersecurity Threat (source)
- THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03) (source)
- The cybersecurity gender gap: How diverse teams improve threat response (source)
- THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10) (source)
- THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 - Nov 17) (source)