Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
xiv Preface
Chapter 8: e Love of Clouds and Incidents—
e Vain Search for Validation
Many folks in security are inwardly reective of their lives as CASEs
and conscious that the downward spiral of the industry has eectively
led to their hands being tied in being able to oer anything of any value
to their organizations. is has led to some unfortunate developments
in the industry that end up wasting a lot of corporate resources and
further damaging the reputation of security departments.
In Chapter 8, I rst examine the common premise that in security
we need a global incident database in order to “prove” the existence of
a threat (when there is some doubt expressed over risks, we can go to
some database of collected data concerning past
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355