12

Modern Approaches to Security and Compliance

In the previous chapters of this book, I introduced you to the Cybersecurity Usual Suspects, and we discussed Cybersecurity Threat Intelligence (CTI), vulnerability disclosures, threats such as malware and internet-based threats, the roles governments can play in cybersecurity, and government access to data. We also discussed ingredients that can help support a successful cybersecurity strategy, evaluated some cybersecurity strategies, took a close look at how the best scoring strategy could be implemented, and discussed how to measure the performance of that strategy.

Now we are going to take a closer look at how newer, more modern technologies, such as cloud computing, can help security and compliance ...

Get Cybersecurity Threats, Malware Trends, and Strategies - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.