Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem
By Chris Hughes and Nikki Robinson
()
Currently unavailable
Currently unavailable
About this ebook
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management
Organizations spend tremendous time and resources addressing vulnerabilities to their technology, software, and organizations. But are those time and resources well spent? Often, the answer is no, because we rely on outdated practices and inefficient, scattershot approaches. Effective Vulnerability Management takes a fresh look at a core component of cybersecurity, revealing the practices, processes, and tools that can enable today's organizations to mitigate risk efficiently and expediently in the era of Cloud, DevSecOps and Zero Trust.
Every organization now relies on third-party software and services, ever-changing cloud technologies, and business practices that introduce tremendous potential for risk, requiring constant vigilance. It's more crucial than ever for organizations to successfully minimize the risk to the rest of the organization's success. This book describes the assessment, planning, monitoring, and resource allocation tasks each company must undertake for successful vulnerability management. And it enables readers to do away with unnecessary steps, streamlining the process of securing organizational data and operations. It also covers key emerging domains such as software supply chain security and human factors in cybersecurity.
- Learn the important difference between asset management, patch management, and vulnerability management and how they need to function cohesively
- Build a real-time understanding of risk through secure configuration and continuous monitoring
- Implement best practices like vulnerability scoring, prioritization and design interactions to reduce risks from human psychology and behaviors
- Discover new types of attacks like vulnerability chaining, and find out how to secure your assets against them
Effective Vulnerability Management is a new and essential volume for executives, risk program leaders, engineers, systems administrators, and anyone involved in managing systems and software in our modern digitally-driven society.
Chris Hughes
Chris Hughes is the co-founder of the Economic Security Project, a network of policymakers, academics, and technologists working to end poverty and rebuild the middle class through a guaranteed income. He co-founded Facebook as a student at Harvard and later led Barack Obama’s digital organizing campaign for President. Hughes was the owner and publisher of The New Republic magazine from 2012 to 2016. He lives in New York’s Greenwich Village with his family. Chris is the author of Fair Shot: Rethinking Inequality and How We Earn.
Read more from Chris Hughes
Fair Shot: Rethinking Inequality and How We Earn Rating: 3 out of 5 stars3/5The Complete Series to Coaching 4-6 Year Olds: All Seasons Rating: 0 out of 5 stars0 ratingsThe Complete Series to Coaching 4-6 Year Olds: Autumn Rating: 0 out of 5 stars0 ratingsThe Complete Series to Coaching 4-6 Year Olds: Spring Rating: 0 out of 5 stars0 ratingsSoftware Transparency: Supply Chain Security in an Era of a Software-Driven Society Rating: 0 out of 5 stars0 ratingsThe Complete Series to Coaching 4-6 Year Olds: Winter Rating: 0 out of 5 stars0 ratingsThe Complete Series to Coaching 4-6 Year Olds: Summer Rating: 0 out of 5 stars0 ratingsEffective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem Rating: 0 out of 5 stars0 ratings
Related to Effective Vulnerability Management
Security For You
How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5CISSP Study Guide Rating: 4 out of 5 stars4/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsGame Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratings
Reviews for Effective Vulnerability Management
0 ratings0 reviews