Preface
For decades, organizations have applied security strategies, technologies, and expertise designed to solve the cyberthreat issues they face daily. These issues include infections from advanced malware (including ransomware), exploitation of operating system and application vulnerabilities, attacker takeover of computers and devices, phishing of employees leading to advanced persistent threats, code injections and abuse of websites and applications, denial-of-service outages, financial fraud, data theft, and more. The list of successful campaigns resulting in losses is indeed lengthy.
Today’s organizations are not, however, at fault. They are deploying the best security technologies available; they are implementing them in the recommended fashion; and, in most cases, they are following industry-accepted best practices. However, the increases in data breach figures in the past few years alone—affecting millions, if not billions of people worldwide—are staggering. Having been personally affected, like so many others due to some of the largest data breaches on record, motivated me to write this book and hopefully establish that a better way is possible.
Why This Book
It’s been repeatedly demonstrated that the steps we are taking to protect ourselves and our organizations from cyberattackers must be inadequate. If not, why are attackers still so successful, and why are our organizations still being breached? We can all probably agree that something is simply missing in our ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access