The effective and proven techniques presented in this book combine a multi-layer defense-in-depth approach to cybersecurity. It illustrates how various technologies and algorithms are applied in practice to build real-world security solutions and it explains how these solutions fit into the different bands of the security spectrum, together, form a comprehensive layered defense. This layered defense includes: Next generation endpoint techniques Virtualization and isolation Browser protection Network protection Integrating endpoint and network protection Gathering and analyzing security data in a data lake User behavior analysis Cloud security The security horizon with blockchain and quantum computing.
Decoding Cybersecurity : A Rosetta Stone for C(I)SOs, Analysts and Developers