Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
"The history of the IT security industry is one of necessitated evolution: A new threat arises, IT responds. Driven by mobile, cloud, and remote-work megashifts, the new IT security model breaks this reactive cycle. The new IT security is adaptive, agile, cloud-based, and built on Zero Trust principles: Limit the opportunity for attack and minimize the potential for damage...because you can't steal what you can't see. Richard Stiennon has chronicled this revolution in Security Yearbook 2024. It is vital reading for enterprise IT leaders looking to establish the best-in-world IT security capabilities of the future." --Jay Chaudhry, CEO and founder of Zscaler "Our future depends on the strength of our cyber infrastructure. Stiennon's experience and contribution to this industry makes him the best person to tell its story and his voice is the best one to help guide us into the future." --Gil Shwed, CEO and founder of Check Point Software Cybersecurity is not just an industry, but a community of dedicated guardians of the digital world. Our common purpose and shared mission have created a vibrant culture, storied history, and boundless future, marked by noteworthy events and distinguished by remarkable individuals, fascinating companies, and captivating stories. Through his yearbook series, Richard Stiennon masterfully weaves together valuable industry research and sentimental reflection to encapsulate all that defines us, in a style that only he can deliver." --Kevin Magee, CSO of Microsoft Canada Security Yearbook 2024 is the fifth edition in an annual series. It is the story of the people, companies, and events that comprise the history of the IT security industry. In this edition you will discover the early history of Symantec, Network Associates, Borderware, Check Point Software, Netwitness, Tenable, Sourcefire, Quick Heal, Trend Micro and dozens of other companies that contributed to the growth of an industry that is comprised of 3,700+ vendors of security products. The Directory has been updated to reflect the change in headcount at each vendor during 2023.
All organizations are embarking on a journey to the cloud. Their users are online and taking advantage of productivity tools like Salesforce. Enterprises are in the midst of transitioning to Office 365 for email and Office tools. This book maps the journey of 16 leading enterprises around the world including Fannie Mae, Siemens, Google, Microsoft, and Amazon itself. It provides practical guidance for any CXO no matter what stage they are on of their journey .
The move on the part of the US military, which began in 1996, to Network-Centric Warfare (NCW), meant the combination of sensor grids, C&C grids, and precision targeting to increase speed to command, and represented a military offset. Along with networking comes exposure to cyber attacks, attacks that will be used in future wars.
Design, implement, and integrate a complete data sanitization programIn Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security, a well-rounded team of accomplished industry veterans delivers a comprehensive guide to managing permanent and sustainable data erasure while complying with regulatory, legal, and industry requirements. In the book, you'll discover the why, how, and when of data sanitization, including why it is a crucial component in achieving circularity within IT operations. You will also learn about future-proofing yourself against security breaches and data leaks involving your most sensitive information--all while being served entertaining industry anecdotes and commentary from leading industry personalities.The authors also discuss:Several new standards on data erasure, including the soon-to-be published standards by the IEEE and ISOHow data sanitization strengthens a sustainability or Environmental, Social, and Governance (ESG) programHow to adhere to data retention policies, litigation holds, and regulatory frameworks that require certain data to be retained for specific timeframesAn ideal resource for ESG, data protection, and privacy professionals, Net Zeros and Ones will also earn a place in the libraries of application developers and IT asset managers seeking a one-stop explanation of how data erasure fits into their data and asset management programs.
All organizations are embarking on a journey to the cloud. Their users are online and taking advantage of productivity tools like SalesForce. Enterprises are in the midst of transitioning to Office 365 for email and Office tools. This book maps the journey of 16 leading enterprises around the world including Fannie Mae, Siemens, Google, Microsoft, and Amazon itself. It provides practical guidance for any CXO no matter what stage they are on of their journey.Secure Cloud Transformation provides a roadmap for digital transformation in the cloud era. From the use of Software as a Service all the way to a cloud-first strategy. The end game? For a modern organization that has embraced the cloud the internet is the new corporate network and the cloud is the new datacenter.
This book examines in depth the major recent cyber attacks that have taken place in the United States and around the world including a discussion of the 2016 election. This book discusses the implications of such attacks and offers solutions to the vulnerabilities that made these attacks possible.
In this new book, Stiennon presents a comprehensive view of the technology, methodology, and tools needed to defend digital assets from targeted attacks. It is an in-depth manual on the tools, techniques, technology, and policies needed to defend organizations from cyber espionage, Denial of Service attacks, and stealthy infiltration.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.