Big Breaches: Cybersecurity Lessons for Everyone

  • 6h 30m
  • Moudy Elbayadi, Neil Daswani
  • Apress
  • 2021

The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone―not just techies―to become informed and empowered on the subject of cybersecurity.

In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this book.

You will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more. These valuable lessons are applied to real-world cases, helping you deduce just how high-profile mega-breaches at Target, JPMorgan Chase, Equifax, Marriott, and more were able to occur.

Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, Big Breaches ensures that everybody comes away with essential knowledge to move forward successfully. Arm yourself with this book’s expert insights and be prepared for the future of cybersecurity.

In this Book

  • The Root Causes of Data Breaches
  • The Capital One Breach
  • The Marriott Breach
  • The Equifax Breach
  • Facebook Security Issues and the 2016 US Presidential Election
  • The OPM Breaches of 2014 and 2015
  • The Yahoo Breaches of 2013 and 2014
  • The Target and JPMorgan Chase Breaches of 2013 and 2014
  • The Seven Habits of Highly Effective Security
  • Advice for Boards of Directors
  • Advice for Technology and Security Leaders
  • Technology Defenses to Fight the Root Causes of Breach: Part One
  • Technology Defenses to Fight the Root Causes of Breach: Part Two
  • Advice to Cybersecurity Investors
  • Advice to Consumers
  • Applying Your Skills to Cybersecurity
  • Recap
SHOW MORE
FREE ACCESS