Repositorio de Libros

Biblioteca Online de libros en formatos PDF, EPUB y MOBI

Threat Hunting in the Cloud

Resumen del Libro

Libro Threat Hunting in the Cloud

Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors. You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation. With this book you'll learn: Key business and technical drivers of cybersecurity threat hunting frameworks in today's technological environment Metrics available to assess threat hunting effectiveness regardless of an organization's size How threat hunting works with vendor-specific single cloud security offerings and on multi-cloud implementations A detailed analysis of key threat vectors such as email phishing, ransomware and nation state attacks Comprehensive AWS and Azure "how to" solutions through the lens of MITRE Threat Hunting Framework Tactics, Techniques and Procedures (TTPs) Azure and AWS risk mitigation strategies to combat key TTPs such as privilege escalation, credential theft, lateral movement, defend against command & control systems, and prevent data exfiltration Tools available on both the Azure and AWS cloud platforms which provide automated responses to attacks, and orchestrate preventative measures and recovery strategies Many critical components for successful adoption of multi-cloud threat hunting framework such as Threat Hunting Maturity Model, Zero Trust Computing, Human Elements of Threat Hunting, Integration of Threat Hunting with Security Operation Centers (SOCs) and Cyber Fusion Centers The Future of Threat Hunting with the advances in Artificial Intelligence, Machine Learning, Quantum Computing and the proliferation of IoT devices. Perfect for technical executives (i.e., CTO, CISO), technical managers, architects, system admins and consultants with hands-on responsibility for cloud platforms, Threat Hunting in the Cloud is also an indispensable guide for business executives (i.e., CFO, COO CEO, board members) and managers who need to understand their organization's cybersecurity risk framework and mitigation strategy.

Más detalles de libro

Tñitulo Secundario : Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks

Cantidad de páginas 636

Autor:

  • Chris Peiris
  • Binil Pillai
  • Abbas Kudrati

Categoría:

Formatos Disponibles:

MOBI, EPUB, PDF

Descargar Ebook

Valoración

Popular

4.4

62 Valoraciones Totales


Más libros de Informática

UX Strategy

Libro UX Strategy

User experience (UX) strategy lies at the intersection of UX design and business strategy, but until now, there hasn't been an easy-to-apply framework for executing it. This hands-on guide introduces lightweight product strategy tools and techniques to help you and your team devise innovative digital solutions that people want. Author Jaime Levy shows UX/UI designers, product managers, entrepreneurs, and aspiring strategists simple to advanced methods that can be applied right away. You'll gain valuable perspective through business cases and historical context. This second edition includes...

Velocidad de escape

Libro Velocidad de escape

Ciberpunks, ciberhippies, tecnopaganos y raver, las nuevas corrientes de la ciencia ficcion, el arte extremo de Stelarc y Orlan, las maquinarias diabolicas de los Survival Research Laboratories, la musica postindustrial y la utilizacion comunitaria de las redes de internet: la revolucion informatica ha generado una nueva contracultura global que se sirve de las nuevas tecnologias con modalidades imprevistas. Miles y miles de jovenes, y de menos jovenes, y multiples artistas de todo el mundo estan creando nuevos espacios de libertad, ensanchando los confines de la imaginacion y planteandonos...

Fundamentos de diseño de bases de datos

Libro Fundamentos de diseño de bases de datos

La quinta edición del libro Fundamentos de bases de datos de los autores Silberschatz, Korth y Sudarshan ofrece todo lo necesario para una profunda comprensión de los sistemas de bases de datos. Los autores explican conceptos fundamentales de la gestión de bases de datos con todo el detalle y atención que los lectores de este clásico libro de texto esperan. Se examinan en profundidad los lenguajes de consultas, el diseño de esquemas, el desarrollo de aplicaciones, la implementación de sistemas, el análisis de datos y las arquitecturas de las bases de datos. El libro es apropiado tanto ...

HTML, presente y futuro de la web

Libro HTML, presente y futuro de la web

HTML5 nace con un fuerte apoyo de algunos de los gigantes de la tecnológica como Google, Microsoft o Apple. La industria ha adoptado HTML5 como la mejor solución para el desarrollo y distribución de aplicaciones compatibles con múltiples navegadores y dispositivos (entre ellos los populares smartphones). Una aplicación web basada en HTML5 puede ejecutarse en cualquier ordenador independientemente del sistema operativo: Lo único que necesita es un intérprete del lenguaje, que en este caso sería un navegador Web. El HTML es la piedra angular de la plataforma web de código abierto del...

Libros Recomendados 2025



Últimas Búsquedas


Categorías Destacadas