After understanding most of the critical aspects of the threat landscape, it's time to change the way we look at cybersecurity. The endless variety of malware has the capability of being persistent, hidden, self-destructive, and can bypass traditional security systems by behaving like a legitimate user, making defenders adopt a new security approach to achieve a better cyber posture. In this chapter, we will understand the different approaches adopted by defenders to combat advanced threats and to strengthen cybersecurity systems.
This chapter will introduce some of the most widely used security practices deployed, from network perimeters to server farms. This chapter will also explore insights on the zero-trust security approach and the breach-acceptance security approach.
In this chapter, you will learn about the following topics:
- The security ecosystem...