Hot Best Seller

A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using

Availability: Ready to download

Most companies are using inefficient computer security defenses which allow hackers to break in at will. It's so bad that most companies have to assume that it is already or can easily be breached. It doesn't have to be this way! A data-driven computer security defense will help any entity better focus on the right threats and defenses. It will create an environment which Most companies are using inefficient computer security defenses which allow hackers to break in at will. It's so bad that most companies have to assume that it is already or can easily be breached. It doesn't have to be this way! A data-driven computer security defense will help any entity better focus on the right threats and defenses. It will create an environment which will help you recognize emerging threats sooner, communicate those threats faster, and defend far more efficiently. What is taught in this book...better aligning defenses to the very threats they are supposed to defend against, will seem commonsense after you read them, but for reasons explained in the book, aren't applied by most companies. The lessons learned come from a 30-year computer security veteran who consulted with hundreds of companies, large and small, who figured out what did and didn't work when defending against hackers and malware. Roger A. Grimes is the author of nine previous books and over 1000 national magazine articles on computer security. Reading A Data-Driven Computer Security Defense will change the way you look at and use computer security for now on.


Compare

Most companies are using inefficient computer security defenses which allow hackers to break in at will. It's so bad that most companies have to assume that it is already or can easily be breached. It doesn't have to be this way! A data-driven computer security defense will help any entity better focus on the right threats and defenses. It will create an environment which Most companies are using inefficient computer security defenses which allow hackers to break in at will. It's so bad that most companies have to assume that it is already or can easily be breached. It doesn't have to be this way! A data-driven computer security defense will help any entity better focus on the right threats and defenses. It will create an environment which will help you recognize emerging threats sooner, communicate those threats faster, and defend far more efficiently. What is taught in this book...better aligning defenses to the very threats they are supposed to defend against, will seem commonsense after you read them, but for reasons explained in the book, aren't applied by most companies. The lessons learned come from a 30-year computer security veteran who consulted with hundreds of companies, large and small, who figured out what did and didn't work when defending against hackers and malware. Roger A. Grimes is the author of nine previous books and over 1000 national magazine articles on computer security. Reading A Data-Driven Computer Security Defense will change the way you look at and use computer security for now on.

42 review for A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using

  1. 4 out of 5

    Ben Rothke

    In the world of information security, the ability to actually implement something and bring ideas to fruition, is commendable. In A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using, author Roger A. Grimes take his decades of experience and give the reader excellent advice on how they can secure their networks and do just that. As the title implies, the data-driven approach to information security moves the line of defense from the network to the data layer. In the world of information security, the ability to actually implement something and bring ideas to fruition, is commendable. In A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using, author Roger A. Grimes take his decades of experience and give the reader excellent advice on how they can secure their networks and do just that. As the title implies, the data-driven approach to information security moves the line of defense from the network to the data layer. It, to a degree, complements, but is not as complex as the notion of zero trust networks. Grimes writes that one of the main problems that will exacerbate ineffective security at a firm is when they do not properly align computer security defenses with the actual threats and risks they face. The book attempts to create a new framework that firms can use to more efficiently allocate defensive resources against the most likely threats that they will face. The benefits to this approach are impressive, in that firms can respond to threats in a timelier manner, create metrics that provide real information (as opposed to meaningless self-referential metrics), better threat intelligence, and more. The book notes that a data-driven computer security defense is not necessarily one of hardware and software; rather it’s an approach to information security that uses a firm’s own data to understand specifics threats and risks. In order to do information security right, every firm needs to ensure that they are capturing the right data, and they have enough evidence to base security decisions off that data. The next step is to prioritize the threats based on that evidence. A Data-Driven Computer Security Defense is a great resource for those looking to slow down and escape the information security hamster wheel of pain and start a program to truly deal with information security.

  2. 5 out of 5

    David Houchin

    Outstanding book! This should be the bible for any IT / InfoSec professional.

  3. 4 out of 5

    Corey

    Excellent approach. As a reader, I need greater concision.

  4. 5 out of 5

    Adam

  5. 4 out of 5

    Juston

  6. 5 out of 5

    John

  7. 5 out of 5

    Jeremy

  8. 4 out of 5

    Heath Landreth

  9. 5 out of 5

    Joshua Sobota

  10. 5 out of 5

    Katania-Lea Taylor

  11. 5 out of 5

    Matthew

  12. 4 out of 5

    Subhajit Das

  13. 4 out of 5

    Cuellared

    The same problem with all this kind of books. A mile wide an inch deep.

  14. 5 out of 5

    David

  15. 4 out of 5

    Chris Bentley

  16. 5 out of 5

    Geir Arild Engh-Hellesvik

  17. 4 out of 5

    Andrzej

  18. 4 out of 5

    David Godbee

  19. 4 out of 5

    Brian Knoblauch

  20. 5 out of 5

    Dale Klein

  21. 5 out of 5

    Paul Turcotte

  22. 5 out of 5

    Benjamin

  23. 4 out of 5

    Tim Love

  24. 5 out of 5

    Lori Horton

  25. 4 out of 5

    Lucas Truax

  26. 5 out of 5

    Venumadhav Dharmavaram

  27. 4 out of 5

    Joe

  28. 4 out of 5

    Rick Howard

  29. 5 out of 5

    Balázs Nagy

  30. 4 out of 5

    Andrzej

  31. 4 out of 5

    Chris

  32. 4 out of 5

    Azzaz Akl

  33. 5 out of 5

    Sang R Chung

  34. 5 out of 5

    Jason

  35. 4 out of 5

    Ironide

  36. 4 out of 5

    Achinthya

  37. 4 out of 5

    Eric

  38. 5 out of 5

    Matthew Lorimor

  39. 5 out of 5

    Stashima

  40. 4 out of 5

    Andrew

  41. 5 out of 5

    Mike

  42. 5 out of 5

    Xaid Owen

Add a review

Your email address will not be published. Required fields are marked *

Loading...