Part 2: Controlling the Fray

In this part of the book, we will look into the controls that can be implemented by the blue team to protect assets in its organization. Moreover, we will also review how these controls can be augmented by Cyber Threat Intelligence, and how the blue team could improve the efficacy of its controls.

This part of the book comprises the following chapters:

What are security controls?

Security controls play an important role in shaping the actions taken by cybersecurity professionals to protect an organization. A lack ...

Get Cybersecurity Blue Team Strategies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.