Cyber threat intelligence the no-nonsense guide for CISOs and security managers
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization’s resources. Adopting an...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified] :
Apress
[2021]
|
Edición: | 1st ed. 2021. |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009631607806719 |
Tabla de Contenidos:
- Chapter 1: The Cybersecurity Wild West
- Chapter 2: The Cybersecurity Wild West
- Chapter 3: Cyber Threat Intelligence–What Does It Mean?
- Chapter 4: Determining What Your Business Needs
- Chapter 5: How Can I Implement This? (No Matter Your Budget)
- Chapter 6: Things to Consider When Implementing CTI
- Chapter 7: The Importance of OSINT
- Chapter 8: I Already Pay for Vendor X. Should I Botherwith CTI?
- Chapter 9: Summary
- Chapter 10: Useful Resources.