Chapter 8: Effective Defense Tactics and Data Protection

Organizational security infrastructures are made of several different layers. While threat intelligence (TI) focuses on informed cyclic security defense and protection based on data and provides an efficient way to stay ahead of cyber threats, an organization's first layer of defense depends on how security is globally integrated into the business operations. The organization must ensure that security best practices and policies are maintained at all costs and at any given point (development, integration, resource management, communication, and so on). It must combine people, processes, and technology to ensure that critical data is protected throughout its entire life cycle. Data and ...

Get Mastering Cyber Intelligence now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.