Chapter 10

Proactive Security and Reputational Ranking

Introduction

Organizations are focusing resources on cyber security and still getting compromised. What organizations are doing today to secure systems is not completely working. It is important to point out that it is not because the technology does not work; it is because the technology does not work against the APT the way it is configured within most organizations. Let’s clarify. First, many technologies are built to solve a certain problem. If you purchased a hammer to hang up a picture, you should not be mad because it is not effective a cutting a board in half. While you could argue that the hammer is ineffective at breaking the board in half, that would not be fair. It was not designed ...

Get Advanced Persistent Threat now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.