Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Use coupon code “FEBRUARY20” for a 20% discount on all items! Valid until 28-02-2025

Site Logo

Royal Mail  express delivery to UK destinations

Regular sales and promotions

Stock updates every 20 minutes!

Losing the Cybersecurity War: And What We Can Do to Stop It

3 in stock

Firm sale: non returnable item
SKU 9781032364087 Categories ,
Select Guide Rating
An explanation of the five pillars or battlefields of Cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. The five battlefields include Economics, Technology, Information, Education and Leadership.

This book explains the five pillars...

£29.99

Buy new:

Delivery: UK delivery Only. Usually dispatched in 1-2 working days.

Shipping costs: All shipping costs calculated in the cart or during the checkout process.

Standard service (normally 2-3 working days): 48hr Tracked service.

Premium service (next working day): 24hr Tracked service – signature service included.

Royal mail: 24 & 48hr Tracked: Trackable items weighing up to 20kg are tracked to door and are inclusive of text and email with ‘Leave in Safe Place’ options, but are non-signature services. Examples of service expected: Standard 48hr service – if ordered before 3pm on Thursday then expected delivery would be on Saturday. If Premium 24hr service used, then expected delivery would be Friday.

Signature Service: This service is only available for tracked items.

Leave in Safe Place: This option is available at no additional charge for tracked services.

Description

Product ID:9781032364087
Product Form:Paperback / softback
Country of Manufacture:GB
Title:Losing the Cybersecurity War
Subtitle:And What We Can Do to Stop It
Authors:Author: Steve King, Kiren Chaudry
Page Count:148
Subjects:Peace studies and conflict resolution, Peace studies & conflict resolution, Politics and government, Warfare and defence, Digital and information technologies: Legal aspects, Computer security, Computer networking and communications, Network security, Computer architecture and logic design, Politics & government, Warfare & defence, Legal aspects of IT, Computer security, Computer networking & communications, Network security, Computer architecture & logic design
Description:Select Guide Rating
An explanation of the five pillars or battlefields of Cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. The five battlefields include Economics, Technology, Information, Education and Leadership.

This book explains the five pillars or battlefields of cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. We have taken a deep dive into each of five battlefields where we have a decided disadvantage due to constitutional structure and moral behavioral guidelines, where we provide examples of how we got here, what we can do about it, why we got here, and how we can avoid these traps in the future. This is a unique viewpoint that has never been explored – the five battlefields include Economics, Technology, Information, Education, and Leadership – and how each has contributed to our current disadvantage on the global stage. We go on to discuss how Zero Trust can change the game to create an advantage for us going forward. The credibility of Zero Trust stems directly from the father of Zero Trust, John Kindervag, who says, “And now, Steve has written a new book on Zero Trust called Losing the Cybersecurity War: And What We Can Do to Stop It. It is undeniably the best Zero Trust book yet written. While other writers have focused on implementing Zero Trust from their perspectives, Steve focuses on why Zero Trust is so important on the modern cybersecurity battlefield. His concept of the five cyber battlefields is a great insight that will help us win the cyberwar. By weaving Zero Trust principles throughout these five concepts, Steve demonstrates how the ideas and efforts involved in building Zero Trust environments will lead to a profound shift in terrain advantage. No longer will attackers own the high ground. As defenders and protectors, we can leverage modern technology in a Zero Trust way to keep our data and assets safe from infiltration and exploitation.”


Imprint Name:CRC Press
Publisher Name:Taylor & Francis Ltd
Country of Publication:GB
Publishing Date:2022-12-07