Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Cybersecurity Threats, Malware Trends, and Strategies
Cybersecurity Threats, Malware Trends, and Strategies

Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization , Second Edition

eBook
$9.99 $35.99
Paperback
$44.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Table of content icon View table of contents Preview book icon Preview Book

Cybersecurity Threats, Malware Trends, and Strategies

What to Know about Threat Intelligence

I admit it, I’m a threat intelligence data geek. I really enjoy studying threat intelligence. It helps me understand the tactics and techniques that are in vogue with attackers and how the threat landscape is evolving. One of the best jobs I had at Microsoft was working as a Director of Trustworthy Computing. In this role I was the executive editor and a contributor to the Microsoft Security Intelligence Report, which we called “the SIR.” During the 8 or 9 years I helped produce the SIR, we published more than 20 volumes and special editions of this report, spanning thousands of pages. I gave literally thousands of threat intelligence briefings for customers around the world, as well as press and analyst interviews. I can tell you from experience, interviews on live television in front of millions of people, discussing threat intelligence, are nerve-wracking! (BBC News, 2013).

Building and publishing the SIR was a lot of work, but very rewarding. In this role, I had the opportunity to work with so many smart people in the Microsoft Security Response Center (MSRC), the Microsoft Malware Protection Center (MMPC), the Microsoft Digital Crimes Unit (DCU), the Security Development Lifecycle (SDL) team, Microsoft IT, and many others. Doing this work gave me a deep appreciation for the value of good threat intelligence and some of the ways it is produced. Microsoft has continued to invest in threat intelligence and they now have a center dedicated to it called the Microsoft Threat Intelligence Center (MSTIC), in which a few of my former colleagues work.

I provide a deep dive into data from the SIR in Chapter 4, The Evolution of Malware. I also provide a deep dive into security vulnerabilities in Chapter 3, Using Vulnerability Trends to Reduce Risk and Costs.

But before I get to this data, let me provide some useful context to help you consume the data in those chapters and other threat intelligence you encounter in your career.

What is threat intelligence?

Threat Intelligence (TI) is sometimes referred to as Cyber Threat Intelligence (CTI) to make it clear that the intelligence focuses on cybersecurity threats as opposed to other types of threats. The concept is ancient: the more you know about your enemies and how they plan and execute their attacks, the more prepared you can be for those attacks.

Simply put, CTI provides organizations with data and information on how attackers have been leveraging the Cybersecurity Usual Suspects, what they have been doing in IT environments post-initial compromise, and sometimes attribution for attacks to specific threat actors. Threats can also include various categories of malware, exploitation of vulnerabilities, web-based attacks, Distributed Denial of Service (DDoS) attacks, social engineering attacks, and others. Of course, as I wrote in Chapter 1, Introduction, there is also high interest in information about the attackers themselves – who they are, where they are located, whether they are state-sponsored or an independent criminal organization, and details on their modus operandi from their past attacks. An entire industry has grown around the demand for attribution and information on threat actors.

Left arrow icon Right arrow icon

Key benefits

  • Protect your organization from cybersecurity threats with field-tested strategies
  • Understand threats such as exploits, malware, internet-based threats, and governments
  • Measure the effectiveness of your organization's current cybersecurity program against modern attackers’ tactics

Description

Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services’ former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you’ll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You’ll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud. By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.

Who is this book for?

This book is for anyone who is looking to implement or improve their organization's cybersecurity strategy. This includes Chief Information Security Officers (CISOs), Chief Security Officers (CSOs), compliance and audit professionals, security architects, and cybersecurity professionals. Basic knowledge of Information Technology (IT), software development principles, and cybersecurity concepts is assumed.

What you will learn

  • Discover enterprise cybersecurity strategies and the ingredients critical to their success
  • Improve vulnerability management by reducing risks and costs for your organization
  • Mitigate internet-based threats such as drive-by download attacks and malware distribution sites
  • Learn the roles that governments play in cybersecurity and how to mitigate government access to data
  • Weigh the pros and cons of popular cybersecurity strategies such as Zero Trust, the Intrusion Kill Chain, and others
  • Implement and then measure the outcome of a cybersecurity strategy
  • Discover how the cloud can provide better security and compliance capabilities than on-premises IT environments

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Jan 25, 2023
Length: 584 pages
Edition : 2nd
Language : English
ISBN-13 : 9781804618950
Category :
Concepts :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Jan 25, 2023
Length: 584 pages
Edition : 2nd
Language : English
ISBN-13 : 9781804618950
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 146.97
Practical Threat Detection Engineering
$59.99
Cybersecurity Threats, Malware Trends, and Strategies
$44.99
Cybersecurity – Attack and Defense Strategies, 3rd edition
$41.99
Total $ 146.97 Stars icon
Banner background image

Table of Contents

14 Chapters
Introduction Chevron down icon Chevron up icon
What to Know about Threat Intelligence Chevron down icon Chevron up icon
Using Vulnerability Trends to Reduce Risk and Costs Chevron down icon Chevron up icon
The Evolution of Malware Chevron down icon Chevron up icon
Internet-Based Threats Chevron down icon Chevron up icon
The Roles Governments Play in Cybersecurity Chevron down icon Chevron up icon
Government Access to Data Chevron down icon Chevron up icon
Ingredients for a Successful Cybersecurity Strategy Chevron down icon Chevron up icon
Cybersecurity Strategies Chevron down icon Chevron up icon
Strategy Implementation Chevron down icon Chevron up icon
Measuring Performance and Effectiveness Chevron down icon Chevron up icon
Modern Approaches to Security and Compliance Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.9
(38 Ratings)
5 star 94.7%
4 star 2.6%
3 star 0%
2 star 0%
1 star 2.6%
Filter icon Filter
Top Reviews

Filter reviews by




Brian Nov 21, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Excellent, just what I was looking for - great direction for security.
Subscriber review Packt
Amazon Customer May 14, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I just finished reading Phillip Wylie's book, "The Pentester’s Blueprint," and I must say, it's an invaluable resource in the realm of cybersecurity. I only wish I had discovered it earlier in my pursuits. Known as a definitive guide in the field of penetration testing, this book comes highly recommended as essential reading—and rightly so. Wylie skillfully presents a wealth of technical information in a way that is both accessible and engaging.The real beauty of this book lies in its approach to teaching complex ideas. Rather than overwhelming the reader with dense technical data, Wylie initiates a gentle, informative discussion that feels more like a leisurely conversation over tea. This style makes the material approachable and intriguing, steering clear of the dryness typically associated with more technical texts. For those interested in delving deeper, he provides useful links and references."The Pentester’s Blueprint" strikes a perfect balance, making it a fascinating exploration of ethical hacking. While it’s filled with valuable insights, the presentation is never daunting. It’s especially beneficial for those who are curious about the role of a pentester or just starting out in the field. I’m truly grateful that many credible sources recommended this book to me.10/10 from me!
Amazon Verified review Amazon
Rachel Rocha May 01, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
From the C-Suite to the Enthusiasts, “Cybersecurity Threats, Malware Trends, and Strategies" is an accessible and eye-opening resource for anyone desiring to deepen their understanding of and preparedness in the constantly evolving landscape of cybersecurity.Tim Rains shares his wealth of knowledge; delivering practical and actionable strategies for organizations to protect themselves from cyber threats.His book covers an impressive range of subtopics, including:-verifying and utilizing credible threat intelligence-vulnerability trends by vendor and product-a concise briefing on malware and its evolution-internet-based threats-the role governments play in cybersecurity.Rains notes real-world examples that effectively illustrate the concepts within, making it an invaluable resource for business owners, cybersecurity professionals, and those who simply want to know more about security in the digital age.As a SOC Analyst, I was particularly drawn to the chapter on ‘Modern Approaches to Security and Compliance’. Rains details game changers for defenders working in the cloud, which utilize the power of APIs and Automation. His insights are not only enlightening, but also implementable!The breadth of my understanding of cybersecurity strategies has certainly widened. I highly recommend “Cybersecurity Threats, Malware Trends, and Strategies" to anyone seeking to do the same.
Amazon Verified review Amazon
Joshua Aguiar Oct 28, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
It covers a lot of foundational cyber concepts and doesn't drown you with unnecessary info. It's an easy read compared to other books while providing a ton of value. It's a good book to have on your shelf.
Amazon Verified review Amazon
Dr. Roderick Arthur - Security Operations at Confidential Jan 27, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book is a great read for cyber pros who work in a Security Operation Center (SOC), as well those working in the cyber risk space. Tim deep dives on subjects, such as:• Vulnerability Management• Threat Intel• Malware• Internet-Based Threats• Government data protection• And moreMy plan is to read this book from end to end. A five-star read!
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.