The effective and proven techniques presented in this book combine a multi-layer defense-in-depth approach to cybersecurity. It illustrates how various technologies and algorithms are applied in practice to build real-world security solutions and it explains how these solutions fit into the different bands of the security spectrum, together, form a comprehensive layered defense. This layered defense includes:
- Next generation endpoint techniques
- Virtualization and isolation
- Browser protection
- Network protection
- Integrating endpoint and network protection
- Gathering and analyzing security data in a data lake
- User behavior analysis
- Cloud security
- The security horizon with blockchain and quantum computing