How to Defeat Advanced Malware New Tools for Protection and Forensics
Auteur : Dalziel Henry
Coordonnateur : Crosby Simon
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware.
This book is primarily designed for infosec professionals, consultants, network administrators, CIO?s, CTO?s, CISO?s and senior executives who work within the financial industry and are responsible for their company?s endpoint protection.
How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.
Chapter 1: A Primer on Detection for Security
Chapter 2: 2014 Endpoint Exploitation Trends
Chapter 3: A Proposed Solution
Chapter 4: Protection's Weak Link
Chapter 5: Micro-virtualization
Simon Crosby is Co–founder and CTO at Bromium and Bromium Labs. The Bromium Labs team of security analysts has extensive experience in building innovative technologies to counter and defend against advanced attacks. While Bromium has created an innovative new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.
- Learn the basics of protecting your company's online-accessible assets
- Discover strategies that take advantage of micro-virtualization and BYOD
- Become adept at comparing and utilizing different endpoint security products and strategies
Date de parution : 01-2015
Ouvrage de 50 p.
15.2x22.8 cm
Thèmes de How to Defeat Advanced Malware :
Mots-clés :
application vulnerabilities; big data; botted nodes; business objective; business risk; capital expenditure; chief financial officer (CFO); compliance; compliance and regulatory risks; credit card data; customer data; cyber awareness training; cyber investigator; cyber threat center; cyber threat intelligence; cyber-threat analysts; data exfiltration; data loss prevention; DDoS attacks; DLP; DLP alerts; Financial Institutions Examination Council (FFIEC) Guidelines; indicators of compromise (IOCs); intellectual property; Internet Relay Chat (IRC); log analysis; malware signatures; management communication; online intelligence; open-source intelligence team; operational expenditure; operational model; personal identity information; PII; risk assessment; risk professional; security posture; security professional; SIM information; social engineering; social media monitoring; spear phishing; TTPs; URL blacklists; vulnerability threat intelligence