Amazon Price: N/A (as of October 20, 2017 19:14 –
Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental.
Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.
Continue reading “How to Define and Build an Effective Cyber Threat Intelligence Capability: How to Understand, Justify and Implement a New Approach to Security”
Amazon Price: N/A (as of October 21, 2017 07:09 –
As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective.
Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents.
Continue reading “Building an Intelligence-Led Security Program”
Amazon Price: N/A (as of October 21, 2017 04:41 –
In his sensational new book, Economist senior editor Edward Lucas lays bare the naïveté, hypocrisy and sinister background surrounding Edward Snowden, the fugitive American intelligence contractor now living in Moscow. "The Snowden Operation", demolishes Snowden's claim to be a whistleblower. Drawing on 30 years' experience observing the world of intelligence, Lucas depicts Snowden as at best reckless and naïve, and at worst a saboteur. He stole far more secrets than were necessary to make his case and did so in a deliberately damaging matter. Any benefits to the public debate about issues such as meta-data and encryption are far outweighed by the damage done to the West’s security, diplomacy and economic interests.
“The Snowden Operation” highlights the inconsistencies and puzzles in the account of events given by the “Snowdenistas”. It explains how Russia could have sponsored Snowden’s data heist — the greatest disaster ever to hit Western intelligence, and one whose effects have neatly suited Vladimir Putin’s Russia.
Amazon Price: N/A (as of October 21, 2017 02:45 –
The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques
Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed.
Continue reading “File System Forensic Analysis”
Amazon Price: N/A (as of October 21, 2017 08:23 –
In-depth counterintelligence tactics to fight cyber-espionage
"A comprehensive and unparalleled overview of the topic by experts in the field."–Slashdot
Continue reading “Reverse Deception: Organized Cyber Threat Counter-Exploitation”