Shadows and Signals
Shadows and Signals
Dati e Statistiche
Salvato in 0 liste dei desideri
Shadows and Signals
Scaricabile subito
6,49 €
6,49 €
Scaricabile subito

Descrizione


Cyber offense has changed. With AI, attackers compress timelines, personalize lures, and evolve mid-campaign—turning routine business workflows into attack surfaces. Shadows and Signals shows how to retool your organization to win the moment of decision. What's inside: AI-Powered Threats, Demystified: Adaptive phishing and BEC 2.0 that pass DMARC, deepfakes/voice clones that collapse informal trust, autonomous ransomware that exfiltrates before encrypting, and API/supply-chain abuse hiding in trusted integrations. Identity is the Perimeter: Passkeys/FIDO2, conditional access, session security, and just-in-time privileges that time-box risk and block lateral movement. Verification Over Intuition: Two-channel callbacks, passphrase challenges, Vendor of Record (VoR) registries, cooling-off periods, and golden paths built directly into ERP/IDP tools. AI for Defense—Done Right: Intent-centric detections, explainable reason codes, safe automation (quarantine, token revoke), and SOC case-building that connects endpoint, identity, cloud, SaaS, and API signals. Governance You Can Operate: AI Use Policy, Model Bill of Materials (MBOM), red-teaming cadence, AI incident response (prompt injection, poisoning, extraction), and third-party AI due diligence. Culture that Sticks: Role-based micro-learning, champions networks, monthly "Threats We're Seeing," drill design, and recognition programs that reward correct escalation. Actionable assets included: Playbooks: BEC, OAuth scope governance, exfil intent, privilege elevation anomalies, public share exposure, prompt injection. Metrics & Dashboards: Leading indicators (verification coverage, passkey adoption, OAuth recertification, public share dwell time) and lagging outcomes (MTTD/MTTR, losses prevented). Roadmaps: 90/180/365-day plans to stabilize, harden, and operationalize. Localization (GCC/UAE): PDPL alignment, bilingual templates (Arabic/English), WhatsApp/voice-note norms (no high-risk approvals), and regional workweek/time-zone considerations. Who should read this: CISOs and security leaders, IT/identity engineers, SOC analysts, finance/AP & treasury teams, operations leaders, product owners embedding AI in workflows, and founders scaling secure-by-design businesses. Bottom line: You don't need a silver bullet. You need repeatable, explainable systems: identity-centric controls, fast verification protocols, AI-aware detections, and practiced playbooks—measured by the numbers that matter to the business.

Dettagli

Tutti i dispositivi (eccetto Kindle) Scopri di più
Reflowable
9798224361267

Compatibilità

Formato:

Gli eBook venduti da Feltrinelli.it sono in formato ePub e possono essere protetti da Adobe DRM. In caso di download di un file protetto da DRM si otterrà un file in formato .acs, (Adobe Content Server Message), che dovrà essere aperto tramite Adobe Digital Editions e autorizzato tramite un account Adobe, prima di poter essere letto su pc o trasferito su dispositivi compatibili.

Compatibilità:

Gli eBook venduti da Feltrinelli.it possono essere letti utilizzando uno qualsiasi dei seguenti dispositivi: PC, eReader, Smartphone, Tablet o con una app Kobo iOS o Android.

Cloud:

Gli eBook venduti da Feltrinelli.it sono sincronizzati automaticamente su tutti i client di lettura Kobo successivamente all’acquisto. Grazie al Cloud Kobo i progressi di lettura, le note, le evidenziazioni vengono salvati e sincronizzati automaticamente su tutti i dispositivi e le APP di lettura Kobo utilizzati per la lettura.

Clicca qui per sapere come scaricare gli ebook utilizzando un pc con sistema operativo Windows