May 2021
Intermediate to advanced
752 pages
23h 46m
English
Defending your organization from cyberthreats is a cat and mouse game. Both sides are constantly changing their tactics. When the defense tools work, the adversaries acquire the defense technology, reverse engineer it, and develop strategies to bypass it. When the adversaries start to succeed at bypassing security tools, defense companies take note, research the attack being used, and adjust defense capabilities in their tools to prevent future successful exploitation. Somewhere in between all of this back and forth is your organization.
Security is about the combination of people, process, and technology working together to accomplish a goal. You don’t just buy a few products, plug them in, and magically eliminate the risk of being ...