Threat Detection and Response

In the previous chapter, you learned how to identify the common risks involved when designing and launching an application. You also learned the common safeguarding methods to help users to surf applications securely.

In a hyperconnected world, responding to cyber threats is the new reality for organizations and security professionals. In this chapter, we will explore the basics of threat detection and ways to mitigate ongoing threats. Finally, you will learn to choose and deploy an advanced threat protection system for your business goals. The typical network contains information about users and also includes security information. A critical step towards protecting your organization includes having end-to-end ...

Get Practical Network Scanning now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.