© Morey J. Haber and Brad Hibbert 2018
Morey J. Haber and Brad HibbertPrivileged Attack Vectorshttps://doi.org/10.1007/978-1-4842-3048-0_8

8. Data-Centric Audit and Protection

Morey J. Haber and Brad Hibbert2
(1)
Heathrow, Florida, USA
(2)
Carp, Ontario, Canada
 
Not so long ago, it was much easier to protect your data. Perimeter defenses were in place, and there were only so many ways to get to your data. Data came in from IT-approved, enterprise-controlled devices and applications. It lived on your servers and in storage arrays. It was protected by walling off the outsiders and trusting your insiders, but things have changed in a big way. Now, more data than ever is collected from more applications, users, devices, cloud services, and connected hardware, ...

Get Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.