CISO's Next Frontier
portes grátis
CISO's Next Frontier
AI, Post-Quantum Cryptography and Advanced Security Paradigms
Badhwar, Raj
Springer Nature Switzerland AG
08/2021
387
Dura
Inglês
9783030753535
15 a 20 dias
811
Descrição não disponível.
Are you ready for Quantum computing?.- The need for post-quantum cryptography.- Quantum Encryption is not a Paradox.- AI Code of Ethics for Cybersecurity.- The Case of AI/ML in Cybersecurity.- Security for Work-From-Home Technologies.- Secure video conferencing and online collaboration.- If you must work from home, do it securely!.- Security Controls for Remote Access Technologies.- Specialty Malware and backdoors for VDI.- The Future State of Data Security.- Cybersecurity enabled by Zero Trust.- Advanced Active Directory attacks and Prevention.- Cyber Deception Systems.- Hypervisor Introspection.- Bitcoin is a decade old, and so are the threats to the various blockchain ecosystems.- The advanced malware prevention playbook.- The 768K Precipice.- MAC Address Randomization to limit user/device tracking.- Transport Layer Security 1.3.- The use of ESNI with TLS 1.3, is it a boon to privacy?Or does it raise security concerns.- Using FQDN vs IP addresses in FW rules and app configs.- Network Time Protocol (NTP) Security.- Domain Name System (DNS) Security.- Next Gen Wi-Fi and Security.- The next frontier for CA/Certificate security - DANE and Certificate Transparency.- Man-in-the-middle Attack Prevention.- Distributed Denial of Service (DDoS) Prevention.- Intro to API Security - Issues and Some Solutions!.- Windows subsystem for Linux - security risk and mitigation.- Common sense security measures for voice activated assistant devices.- The case for code signing and dynamic white-listing.- Biometrics - Commentary on data breach notification, threats, and data security.- Security requirements for RPA Bots.- Polymorphic and Metamorphic Malware.- Introduction to Cloud Monitoring Security Controls.- Cloud Monitoring Security Controls for AWS.- Cloud Monitoring Security Controls for Azure.- Cloud Policy Enforcement Point.- Dynamic measurement of cyber risk.- OEM and third-party sourced application and services risk.- Commentary on Insider Threat.- Simplified approach to calculate the probability of a cyber event.- Privacy concerns from publicly available meta-data.- Dark Web & Dark Net.- Risk-Based Vulnerability Management.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Cybersecurity;CISO;encryption;cryptography;network security;cloud security;data security;IoT/OT security;blockchain;cyber deception systems;quantum encryption;zero trust;API security
Are you ready for Quantum computing?.- The need for post-quantum cryptography.- Quantum Encryption is not a Paradox.- AI Code of Ethics for Cybersecurity.- The Case of AI/ML in Cybersecurity.- Security for Work-From-Home Technologies.- Secure video conferencing and online collaboration.- If you must work from home, do it securely!.- Security Controls for Remote Access Technologies.- Specialty Malware and backdoors for VDI.- The Future State of Data Security.- Cybersecurity enabled by Zero Trust.- Advanced Active Directory attacks and Prevention.- Cyber Deception Systems.- Hypervisor Introspection.- Bitcoin is a decade old, and so are the threats to the various blockchain ecosystems.- The advanced malware prevention playbook.- The 768K Precipice.- MAC Address Randomization to limit user/device tracking.- Transport Layer Security 1.3.- The use of ESNI with TLS 1.3, is it a boon to privacy?Or does it raise security concerns.- Using FQDN vs IP addresses in FW rules and app configs.- Network Time Protocol (NTP) Security.- Domain Name System (DNS) Security.- Next Gen Wi-Fi and Security.- The next frontier for CA/Certificate security - DANE and Certificate Transparency.- Man-in-the-middle Attack Prevention.- Distributed Denial of Service (DDoS) Prevention.- Intro to API Security - Issues and Some Solutions!.- Windows subsystem for Linux - security risk and mitigation.- Common sense security measures for voice activated assistant devices.- The case for code signing and dynamic white-listing.- Biometrics - Commentary on data breach notification, threats, and data security.- Security requirements for RPA Bots.- Polymorphic and Metamorphic Malware.- Introduction to Cloud Monitoring Security Controls.- Cloud Monitoring Security Controls for AWS.- Cloud Monitoring Security Controls for Azure.- Cloud Policy Enforcement Point.- Dynamic measurement of cyber risk.- OEM and third-party sourced application and services risk.- Commentary on Insider Threat.- Simplified approach to calculate the probability of a cyber event.- Privacy concerns from publicly available meta-data.- Dark Web & Dark Net.- Risk-Based Vulnerability Management.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.