The CISO's Next Frontier : AI, Post-Quantum Cryptography and Advanced Security Paradigms [E-Book] / by Raj Badhwar
This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threats and risks. Cyber security technologies discussed in this book...
Saved in:
Full text |
|
Personal Name(s): | Badhwar, Raj, author |
Edition: |
1st edition 2021 |
Imprint: |
Cham :
Springer,
2021
|
Physical Description: |
XLIII, 387 pages 14 illustrations, 11 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9783030753542 |
DOI: |
10.1007/978-3-030-75354-2 |
Subject (LOC): |
- Are you ready for Quantum computing?
- The need for post-quantum cryptography
- Quantum Encryption is not a Paradox
- AI Code of Ethics for Cybersecurity
- The Case of AI/ML in Cybersecurity
- Security for Work-From-Home Technologies
- Secure video conferencing and online collaboration
- If you must work from home, do it securely!
- Security Controls for Remote Access Technologies
- Specialty Malware and backdoors for VDI
- The Future State of Data Security
- Cybersecurity enabled by Zero Trust
- Advanced Active Directory attacks and Prevention
- Cyber Deception Systems
- Hypervisor Introspection
- Bitcoin is a decade old, and so are the threats to the various blockchain ecosystems
- The advanced malware prevention playbook
- The 768K Precipice
- MAC Address Randomization to limit user/device tracking
- Transport Layer Security 1.3
- The use of ESNI with TLS 1.3, is it a boon to privacy? Or does it raise security concerns
- Using FQDN vs IP addresses in FW rules and app configs
- Network Time Protocol (NTP) Security
- Domain Name System (DNS) Security
- Next Gen Wi-Fi and Security
- The next frontier for CA/Certificate security - DANE and Certificate Transparency
- Man-in-the-middle Attack Prevention
- Distributed Denial of Service (DDoS) Prevention
- Intro to API Security - Issues and Some Solutions!
- Windows subsystem for Linux - security risk and mitigation
- Common sense security measures for voice activated assistant devices
- The case for code signing and dynamic white-listing
- Biometrics - Commentary on data breach notification, threats, and data security
- Security requirements for RPA Bots
- Polymorphic and Metamorphic Malware
- Introduction to Cloud Monitoring Security Controls
- Cloud Monitoring Security Controls for AWS
- Cloud Monitoring Security Controls for Azure
- Cloud Policy Enforcement Point
- Dynamic measurement of cyber risk
- OEM and third-party sourced application and services risk
- Commentary on Insider Threat
- Simplified approach to calculate the probability of a cyber event
- Privacy concerns from publicly available meta-data
- Dark Web & Dark Net
- Risk-Based Vulnerability Management.