Select Page

Content

Cyber Security

News

Keep Yourself Protected

Published Books

See for yourself how experienced we are in the world of cyber security.

Biometric Technology

Biometric Technology

Adopting Biometric Technology

Adopting Biometric Technology

The Science of Biometrics: Security Technology for Identity Verification

The Science of Biometrics: Security Technology for Identity Verification

Protecting Information Assets and IT Infrastructure in the Cloud

Protecting Information Assets and IT Infrastructure in the Cloud

Testing and Securing Web Applications

As we know today, Web Applications have become complex creatures.  They are no longer simply websites with just a front end, but they now have a solid backend as well which can be accessed from anywhere in the world.  In fact, the Web Application of today can occupy a huge chunk of an IT and Network Infrastructure, even if it is all deployed and hosted in a Cloud based Infrastructure.

The aim of this book is to provide to the CIO and CISO of a business or corporation an solid understanding of how to protect their Web Applications that have been created and implemented.  There is just so much to consider.  For example, you have to secure the lines of network communications from the server on which the Web Application resides to the end user and vice versa.  You also have to make sure that any confidential information and data that is transmitted back forth is encrypted to the deepest layers possible.

Then once before the Web Application has hit production mode and is accessible by virtually of the world,  it must be tested from the outside looking in and even vice versa.  This is where the role of Penetration Testing and Threat Hunting, respectively.  These are the only true tests that will reveal if there are any hidden gaps or vulnerabilities, and how they should be remediated immediately.

Finally, if after going through all of the above, and the Web Application is hacked, more than likely all of the Personal Identifiable Information (PII) that has been stored will find its way onto the Dark Web for resale by other Cyberattackers.  Thus, it is crucial to have an understanding of this as well.

This book will all go into all of this detail and much more, from both a technical and real-world application standpoint.  It will be published by CRC Press, by the summer of 2020.  The book is divided into the following chapters:

  • Chapter 1: Network Security
  • Chapter 2: Cryptography
  • Chapter 3: Penetration Testing
  • Chapter 4: Threat Hunting
  • Chapter 5: Conclusions

This book is co-authored by Ravi Das, a Business Development Specialist for The AST Cybersecurity Group, Inc. a leading security content firm based in the Greater Chicago area, as well as David Pearson, Principal Threat Researcher at Awake Security, and Greg Johnson, CEO of Webcheck Security based out of Provo, Utah.

Practical AI For Cybersecurity

As we know, Artificial Intelligence is now fast becoming the big buzzword in the world of Cybersecurity today.  But what it is really about?  How can Artificial Intelligence really be used to help fortify the lines of defense of a business?  How can it help a Penetration or Threat Hunting Team as they try to break down your defense perimeters?  How can it help with task automation?  All of these questions and more will be answered in this upcoming book, to be published by CRC Press by the Spring of 2021.

The book is divided into the following chapters:

  • Chapter 1: Introduction to Artificial Intelligence
  • Chapter 2: Machine Learning
  • Chapter 3: Neural Networks
  • Chapter 4: Computer Vision
  • Chapter 5: Project Management Supplement
  • Chapter 6: Conclusions

This book is being will cover all of the technical and application aspects of Artificial Intelligence, and is co-authored by Ravi Das, a Business Development Specialist for  The AST Cybersecurity Group, Inc. a leading security content firm based in the Greater Chicago area and Brad Bussie, a Managing Director at Trace3, LLC, one of the top Cybersecurity firms in the United States.

Assessing and Insuring Cybersecurity Risk

There are varying types of models which try to ascertain Cybersecurity Risk.  There is no uniform model yet adopted by the industry, therefore, a selection of models will be examined.  From here, how it can be used by the insurance companies and potential policy holders will be further examined.  At the present time, the insurance industry has no means by which they can quantify the level of risk that is tolerable to them as they generate new policies to potential policyholders. 

Rather, the insurance industry uses qualitative variables in order to ascertain if a potential policy holder would be an ideal client, with a tolerable level of risk.  But these variables can be very subjective; thus, potential policy holders who would like to purchase a Cybersecurity Policy may be unjustly discriminated against. 

Also, potential policy holders need a way to quantify their level of risk in terms of the IT Assets they possess, in order to prove to the insurance companies that they have taken a proactive stance in fully understanding their respective threat environments.  As a result, with a quantitative approach being taken, there will be no subjectiveness or discrimination in the awarding of Cybersecurity Insurance policies, and payouts for filed claims should follow a much more uniform process.

The topics of Risk Assessment and Cybersecurity Insurance are becoming a matter of extreme importance in today’s environment.  For example, businesses today are being impacted daily by Cyberattacks, with many new variations coming out from existing threat vectors.  Therefore, businesses need timely insurance policies not only to protect their IT Assets and Intellectual Property, but also to protect their brand reputation and offer customer assistance in case they are hit by a major Cyberattack.

This book will all go into all of this detail and much more. It will be published by CRC Press, by the Fall of 2021.  This book is being co-authored by Ravi Das, a Business Development Specialist for The AST Cybersecurity Group, Inc. a leading security content firm based in the Greater Chicago area, and Page Jeffery, a Project Manager at Trace3, one of the top Cybersecurity firms in the United States.

Contact Us

CHICAGO OFFICES

20 Danada Square West, Suite 245
Wheaton, IL 60189

100 Illinois Street, Suite 200
St. Charles, Illinois 60174

AUSTIN OFFICE

7600 Chevy Chase Drive, Suite 300
Austin, TX  78752

CONTACT INFO

Ravi Das, Business Development Specialist
Office: 630-318-4857
Mobile: 630-802-8605
Efax: 888-356-8305
ravi.das@astcybersecurity.com