-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Cybersecurity Blue Team Strategies
By :

For some people, technology has become magic – they know it works but have no idea how. Those who control this magic fall into two categories, protectors (blue teams), exploiters (red teams and unethical hackers), and those that do both (purple teams). Society uses technology to store and transfer more and more valuable information every day. It has become the core of our daily communications, and no business can run without it. This dependency, as well as technology’s inherent complexity, has created ample opportunity for those that deem harm to an organization to exploit technology to their advantage. It is each organization’s responsibility to ensure that the blue team, its protectors, not only understand how they can protect themselves but also how to successfully respond to, investigate, and help prosecute attackers as they appear.
We sincerely hope that this work has opened your eyes to all the fearsome threats that are out there. We must understand...
Change the font size
Change margin width
Change background colour