Modern defense in depth an integrated approach to better web application security

Despite deploying the latest security technologies, organizations still struggle to defend cloud-based web applications against sophisticated cyberattacks. Many companies have turned to the popular defense-in-depth (DiD) technique, but this multilayered approach has its shortcomings. So where is the...

Full description

Bibliographic Details
Main Author: Gates, Stephen
Format: eBook
Language:English
Published: Sebastopol, CA O'Reilly Media 2019
Edition:First edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02670nmm a2200337 u 4500
001 EB001935745
003 EBX01000000000000001098647
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
050 4 |a TK5105.875.I6 
100 1 |a Gates, Stephen 
245 0 0 |a Modern defense in depth  |b an integrated approach to better web application security  |c Stephen Gates 
246 3 1 |a Integrated approach to better web application security 
250 |a First edition 
260 |a Sebastopol, CA  |b O'Reilly Media  |c 2019 
300 |a 1 volume  |b illustrations 
653 |a Web applications / Security measures 
653 |a Applications Web / Sécurité / Mesures 
653 |a Logiciels malveillants 
653 |a Malware (Computer software) / http://id.loc.gov/authorities/subjects/sh2009005103 
653 |a Data protection / fast 
653 |a Data protection / http://id.loc.gov/authorities/subjects/sh85035859 
653 |a Malware (Computer software) / fast 
653 |a Protection de l'information (Informatique) 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 9781492050353 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781492050360/?ar  |x Verlag  |3 Volltext 
082 0 |a 000 
520 |a Despite deploying the latest security technologies, organizations still struggle to defend cloud-based web applications against sophisticated cyberattacks. Many companies have turned to the popular defense-in-depth (DiD) technique, but this multilayered approach has its shortcomings. So where is the industry headed next? This insightful ebook demonstrates a new approach to DiD that enables current security tools to operate in concert rather than independently. Stephen Gates, edge security evangelist and SME at Oracle Dyn, shows you how companies can establish integrated lines of defense similar to the way in which modern militaries operate on the battlefield. By the end of this book, CSOs, CISOs, security managers, and other professionals will understand how to implement the recommendations in this book today using the security technologies they already have in place. With this ebook, you'll examine: Why today's security technologies alone aren't enough to protect web applications How the existing approach to DiD for cybersecurity falls short of its goals An example of how the modern military uses integrated lines of defense that work in concert Eight lines of defense--including edge routers, DDoS defenses, and WAFs--that are best for protecting cloud-based web applications Ways to use automation and supervised machine learning to integrate your security approaches