Foreword
Security is a critical requirement of any software system, but in today’s world of diverse, skilled, and motivated attackers, it’s more important than ever. In the past, security efforts focused on creating the strongest possible wall to keep attackers out. Security professionals considered the Internet hostile, and treated their own company or organization’s systems as the trusted inner core, making relatively modest investments in segregating different environments and visibility into the interactions between different components. Now, the security world has adopted an “assume breach” mindset that treats perimeter networks as just one aspect of the protective pillar in a three-pillar approach that also includes detection and response. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access