Secured By Design
Secure By Design is a book dedicated to guiding for securing modern technology stacks. A Technology Stack" is the company infrastructure responsible for delivering services to and from computer systems. Almost daily, you hear about businesses being hacked and their critical data stolen. Sadly, many breaches are the result of relaxed or delayed business processes.
To be fair, the internet has been a blessing and a curse. The internet represents unavoidable technological advancements necessary to conduct business in a new way. Drilling into technology, it is the advent of computer-based network(s) that makes security the nightmare it has become. Before the network, computers, monitors, printers, etc. were hard-wired making it almost impossible to break into a system. Now that we have networks, companies have had to think hard and fast and develop processes and procedures to secure these systems. Computer systems consist of multiple pillars. Each pillar has it's own needs to security and to deliver on its purpose. Internet-facing systems suffer from the need to always be available. Pre-internet, systems could be taken down at scheduled intervals, maintained, and returned to service. Post-internet, all companies are www enabled, and the push for 100% online availability drives IT system management insane.
Value Proposition
Secure By Design walks you through and provides examples of how large companies have been hacked. The book describes how these problems could have been proactively addressed. It is not my intent to bash anyone, but the ease of how systems remained exposed was more about "look" instead of protecting the brand. Maintaining systems after exposure and resulting public humiliation is easier. Unfortunately, in many cases, the wrong person got fired after patching identified holes they were not allowed to fix. My book was written after having assisted many companies with analysis and the return of their systems to operations. This book is over 1200 pages and trust me, the contents only scratch the surface. Securing systems is an evolving process. My book does one better than getting you started securing your environment. Available in eBook format.