Analyst & Research Reports

O'Reilly Modern Defense in Depth

Issue link:

Contents of this Issue


Page 6 of 53

Preface For decades, organizations have applied security strategies, technol‐ ogies, and expertise designed to solve the cyberthreat issues they face daily. These issues include infections from advanced malware (including ransomware), exploitation of operating system and appli‐ cation vulnerabilities, attacker takeover of computers and devices, phishing of employees leading to advanced persistent threats, code injections and abuse of websites and applications, denial-of-service outages, financial fraud, data theft, and more. The list of successful campaigns resulting in losses is indeed lengthy. Today's organizations are not, however, at fault. They are deploying the best security technologies available; they are implementing them in the recommended fashion; and, in most cases, they are following industry-accepted best practices. However, the increases in data breach figures in the past few years alone—affecting millions, if not billions of people worldwide—are staggering. Having been person‐ ally affected, like so many others due to some of the largest data breaches on record, motivated me to write this book and hopefully establish that a better way is possible. Why This Book It's been repeatedly demonstrated that the steps we are taking to pro‐ tect ourselves and our organizations from cyberattackers must be inadequate. If not, why are attackers still so successful, and why are our organizations still being breached? We can all probably agree that something is simply missing in our fight against cybercrime. In this book, we are here to discover together what is missing, what's not working, and why. In addition, I make solid recommendations v

Articles in this issue

view archives of Analyst & Research Reports - O'Reilly Modern Defense in Depth