Preview - Reverse Deception Organized Cyber Threat Counter-Exploitation


Posted on by Ben Rothke

When the Yankee Doodle virus first appeared in 1989, all it could do was play the song of the same name.  It was annoying, not in the least bit stealthy and begged to be identified.

Jump to current times and the song has not remained the same. Today's attacks are extremely stealthy and equally nefarious.  The notion of advanced persistent threats (APT) is such that nation states target a specific entity.  Every organization of significant size today needs to be extremely concerned about APT. without a plan of action in which to deal with these threats, the result is no song.

Just got a copy of Reverse Deception Organized Cyber Threat Counter-Exploitation, in which an all-star cast of authors detail how to identify these threats and create a methodology to deal with the various types of APT.

This looks to be an incredibly fascinating and important book.

Full review to follow.


Contributors
Ben Rothke

Senior Information Security Manager, Tapad

Privacy

anti-malware privacy

Blogs posted to the RSAConference.com website are intended for educational purposes only and do not replace independent professional judgment. Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA Conference™, or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.


Share With Your Community

Related Blogs