I have recently published a five parts series on the captioned topic, based on my book of the same title, at Cisco’s Security Blog site. For convenience of the readers of this blog, I have the links to the five parts consolidated here for quick access:

Enjoy the series (if you haven’t read it at the Cisco site ;-)).