
Cyber Crisis
Protecting Your Business from Real Threats in the Virtual World
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
Compra ahora por $17.19
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Michael Butler Murray
-
De:
-
Eric Cole
Acerca de esta escucha
Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day.
Today, we live our lives - and conduct our business - online. Our data is in the cloud and in our pockets on our smartphones, shuttled over public Wi-Fi and company networks. To keep it safe, we rely on passwords and encryption and private servers, IT departments, and best practices. But as you read this, there is a 70 percent chance that your data is compromised...you just don't know it yet.
In Cyber Crisis, Eric Cole gives listeners a clear-eyed picture of the information war raging in cyberspace. Drawing on 30 years of experience, Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves.
No matter who you are or where you work, cybersecurity should be a top priority. The information infrastructure we rely on in every sector of our lives is both critical and vulnerable, and sooner or later, you or your company will be a target.
©2021 Secure Anchor Consulting, LLC (P)2021 TantorLos oyentes también disfrutaron...
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- De Gilan en 01-31-25
De: Matthew K. Sharp, y otros
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- De: Nicole Perlroth
- Narrado por: Allyson Ryan
- Duración: 18 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- De since1968 en 02-13-21
De: Nicole Perlroth
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- De: Chris Moschovitis
- Narrado por: Sean Pratt
- Duración: 9 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- De Roger Swanson en 07-19-18
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- De Gilan en 01-31-25
De: Matthew K. Sharp, y otros
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- De: Nicole Perlroth
- Narrado por: Allyson Ryan
- Duración: 18 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- De since1968 en 02-13-21
De: Nicole Perlroth
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- De: Chris Moschovitis
- Narrado por: Sean Pratt
- Duración: 9 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- De Roger Swanson en 07-19-18
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- De: Cliff Stoll
- Narrado por: Will Damron
- Duración: 12 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- De Todd en 08-11-20
De: Cliff Stoll
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- De: Thomas J. Parenty, Jack J. Domet
- Narrado por: Jonathan Todd Ross
- Duración: 5 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- De J. M. Wilson en 10-20-20
De: Thomas J. Parenty, y otros
-
Blue Ocean Strategy, Expanded Edition
- How to Create Uncontested Market Space and Make the Competition Irrelevant
- De: W. Chan Kim, Renee Mauborgne
- Narrado por: Roger Wayne
- Duración: 8 h y 43 m
- Versión completa
-
General
-
Narración:
-
Historia
In this perennial best seller, embraced by organizations and industries worldwide, globally preeminent management thinkers W. Chan Kim and Renee Mauborgne challenge everything you thought you knew about the requirements for strategic success. Recognized as one of the most iconic and impactful strategy books ever written, Blue Ocean Strategy, now updated with fresh content from the authors, argues that cutthroat competition results in nothing but a bloody red ocean of rivals fighting over a shrinking profit pool.
-
-
Profoundly Insightful
- De James en 10-29-20
De: W. Chan Kim, y otros
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- De: Christian Espinosa
- Narrado por: Kaleo Griffith
- Duración: 6 h y 54 m
- Versión completa
-
General
-
Narración:
-
Historia
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- De Jonathan en 09-01-21
-
Cybersecurity Leadership
- Powering the Modern Organization
- De: Mansur Hasib
- Narrado por: Mansur Hasib
- Duración: 7 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Cybersecurity involves people, policy, and technology. Yet most books and academic programs cover only technology. Hence the implementation of cybersecurity as a people powered perpetual innovation and productivity engine is not done. People think they can buy cybersecurity as a product when in fact the discipline is the modern practice of digital business strategy. People also equate cybersecurity with information security or security alone. However, security is a state, while cybersecurity is a process.
-
-
CIOs and CISOs should read this book...
- De Chad L Fulgham en 08-12-15
De: Mansur Hasib
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De: Kevin Mitnick, William L. Simon
- Narrado por: Ray Porter
- Duración: 13 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- De Joshua en 09-17-14
De: Kevin Mitnick, y otros
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- De: Andy Greenberg
- Narrado por: Ari Fliakos
- Duración: 10 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- De Mike Reaves en 01-28-23
De: Andy Greenberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- De: Perry Carpenter, Kai Roer
- Narrado por: Perry Carpenter
- Duración: 6 h y 55 m
- Versión completa
-
General
-
Narración:
-
Historia
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
-
-
All common sense
- De Amazon Customer en 11-28-24
De: Perry Carpenter, y otros
-
Social Engineering, Second Edition
- The Science of Human Hacking
- De: Christopher Hadnagy
- Narrado por: Christopher Hadnagy
- Duración: 9 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- De RM en 04-10-19
-
90 Days: A CISO’s Journey to Impact
- Define Your Role
- De: SentinelOne Publication, Migo Kedem - introduction
- Narrado por: SentinelOne
- Duración: 53 m
- Versión completa
-
General
-
Narración:
-
Historia
In our first publication, 90 Days: A CISO’s Journey to Impact, we profile some of the world’s leading enterprise cybersecurity leaders. They share their views on the role and advice to create rapid impact in a reasonable amount of time - 90 days. It is our hope that listeners, whether existing or future CISOs, gain insights to continuously improve and be their most effective selves.
-
-
Audio Book is only about 30 minutes long
- De Brad en 06-10-23
De: SentinelOne Publication, y otros
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- De: Rick Howard
- Narrado por: Rick Howard
- Duración: 9 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- De Roman en 11-17-24
De: Rick Howard
Relacionado con este tema
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De: Bruce Schneier
- Narrado por: Roger Wayne
- Duración: 8 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- De Fausto Cepeda en 04-03-19
De: Bruce Schneier
-
Cyber Wars
- Hacks That Shocked the Business World
- De: Charles Arthur
- Narrado por: Joe Jameson
- Duración: 7 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- De Quella en 01-11-19
De: Charles Arthur
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- De: Steven Levy
- Narrado por: Rich Miller
- Duración: 14 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
-
Wish it could be updated today
- De Chip L. en 05-22-21
De: Steven Levy
-
Cyber War
- The Next Threat to National Security and What to Do About It
- De: Robert K. Knake, Richard A. Clarke
- Narrado por: Pete Larkin
- Duración: 10 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Author of the number one New York Times best seller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict -cyber war! Every concerned American should listen to this startling and explosive book that offers an insider's view of White House situation room operations and carries the listener to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation's security.
-
-
Overall not bad
- De Britt Adams en 09-13-22
De: Robert K. Knake, y otros
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- De: John P. Carlin, Garrett M. Graff
- Narrado por: Kevin Stillwell
- Duración: 16 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- De Raz en 01-08-19
De: John P. Carlin, y otros
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De: Bruce Schneier
- Narrado por: Roger Wayne
- Duración: 8 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- De Fausto Cepeda en 04-03-19
De: Bruce Schneier
-
Cyber Wars
- Hacks That Shocked the Business World
- De: Charles Arthur
- Narrado por: Joe Jameson
- Duración: 7 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- De Quella en 01-11-19
De: Charles Arthur
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- De: Steven Levy
- Narrado por: Rich Miller
- Duración: 14 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
-
Wish it could be updated today
- De Chip L. en 05-22-21
De: Steven Levy
-
Cyber War
- The Next Threat to National Security and What to Do About It
- De: Robert K. Knake, Richard A. Clarke
- Narrado por: Pete Larkin
- Duración: 10 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Author of the number one New York Times best seller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict -cyber war! Every concerned American should listen to this startling and explosive book that offers an insider's view of White House situation room operations and carries the listener to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation's security.
-
-
Overall not bad
- De Britt Adams en 09-13-22
De: Robert K. Knake, y otros
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- De: John P. Carlin, Garrett M. Graff
- Narrado por: Kevin Stillwell
- Duración: 16 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- De Raz en 01-08-19
De: John P. Carlin, y otros
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- De: Frank W. Abagnale
- Narrado por: Raymond Todd
- Duración: 7 h y 16 m
- Versión completa
-
General
-
Narración:
-
Historia
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
-
-
Want to Be Paranoid?
- De Sheila en 06-05-07
-
@War
- The Rise of the Military-Internet Complex
- De: Shane Harris
- Narrado por: Stephen R. Thorne
- Duración: 9 h y 43 m
- Versión completa
-
General
-
Narración:
-
Historia
The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq.
-
-
The short history of the US and Cyber War
- De Greg en 02-06-15
De: Shane Harris
-
The Art of War
- De: Sun Tzu
- Narrado por: Aidan Gillen
- Duración: 1 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
The 13 chapters of The Art of War, each devoted to one aspect of warfare, were compiled by the high-ranking Chinese military general, strategist, and philosopher Sun-Tzu. In spite of its battlefield specificity, The Art of War has found new life in the modern age, with leaders in fields as wide and far-reaching as world politics, human psychology, and corporate strategy finding valuable insight in its timeworn words.
-
-
The actual book The Art of War, not a commentary
- De Nemo71 en 12-31-19
De: Sun Tzu
-
The Daily Stoic
- 366 Meditations on Wisdom, Perseverance, and the Art of Living
- De: Ryan Holiday, Stephen Hanselman
- Narrado por: Brian Holsopple
- Duración: 10 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Why have history's greatest minds - from George Washington to Frederick the Great to Ralph Waldo Emerson along with today's top performers, from Super Bowl-winning football coaches to CEOs and celebrities - embraced the wisdom of the ancient Stoics? Because they realize that the most valuable wisdom is timeless and that philosophy is for living a better life, not a classroom exercise. The Daily Stoic offers a daily devotional of Stoic insights and exercises, featuring all-new translations.
-
-
Not well made as audio
- De Andreas en 12-27-16
De: Ryan Holiday, y otros
-
The Mastery of Self
- A Toltec Guide to Personal Freedom
- De: Don Miguel Ruiz Jr.
- Narrado por: Charlie Varon
- Duración: 3 h y 30 m
- Versión completa
-
General
-
Narración:
-
Historia
The ancient Toltecs believed that life, as we perceive it, is a dream. We each live in our own personal dream, and these come together to form the dream of the planet, or the world in which we live. Problems arise when our perception of the dream becomes clouded with negativity, drama, and judgment (of ourselves and others), because it's in these moments of suffering that we have forgotten that we are the architects of our own reality and we have the power to change our dream if we choose.
-
-
listen.. .then listen again
- De Casiano en 12-22-16
-
My Big TOE: Awakening
- Book One of a Trilogy Unifying Philosophy, Physics, and Metaphysics
- De: Thomas Campbell
- Narrado por: Thomas Campbell
- Duración: 11 h y 11 m
- Versión completa
-
General
-
Narración:
-
Historia
My Big TOE: Awakening, written by a nuclear physicist in the language of contemporary culture, unifies science and philosophy, physics and metaphysics, mind and matter, purpose and meaning, the normal and the paranormal. The entirety of human experience (mind, body, and spirit) including both our objective and subjective worlds is brought together under one seamless scientific understanding.
-
-
What a Trip (but to where?)
- De Michael en 11-26-13
De: Thomas Campbell
-
The Autobiography of Malcolm X
- As Told to Alex Haley
- De: Malcolm X, Alex Haley
- Narrado por: Laurence Fishburne
- Duración: 16 h y 52 m
- Versión completa
-
General
-
Narración:
-
Historia
Experience a bold take on this classic autobiography as it’s performed by Oscar-nominated Laurence Fishburne. In this searing classic autobiography, originally published in 1965, Malcolm X, the Muslim leader, firebrand, and Black empowerment activist, tells the extraordinary story of his life and the growth of the Human Rights movement. His fascinating perspective on the lies and limitations of the American dream and the inherent racism in a society that denies its non-White citizens the opportunity to dream, gives extraordinary insight into the most urgent issues of our own time.
-
-
it's Nearly perfect
- De Kerry en 09-16-20
De: Malcolm X, y otros
-
Ho Tactics
- How to MindF**k a Man into Spending, Spoiling, and Sponsoring
- De: G. L. Lambert
- Narrado por: Patrick Stevens
- Duración: 9 h y 12 m
- Versión completa
-
General
-
Narración:
-
Historia
I have discovered a group of women who refuse to be exploited, are immune to manipulation, and who never settle in the name of love. These ladies know what they want and take what they want by beating men at their own game. Utilizing the secrets exposed in this book, these women gain power, money, and status. Men call them gold diggers, women call them hos, but they call themselves winners. This is the book that society doesn't want you to listen to….
-
-
I spent $24,000 in 4 months
- De B.M. en 10-06-18
De: G. L. Lambert
-
Helter Skelter
- The True Story of the Manson Murders
- De: Vincent Bugliosi, Curt Gentry
- Narrado por: Scott Brick
- Duración: 26 h y 29 m
- Versión completa
-
General
-
Narración:
-
Historia
Prosecuting attorney in the Manson trial Vincent Bugliosi held a unique insider's position in one of the most baffling and horrifying cases of the 20th century: the cold-blooded Tate-LaBianca murders carried out by Charles Manson and four of his followers. What motivated Manson in his seemingly mindless selection of victims, and what was his hold over the young women who obeyed his orders? Now available for the first time in unabridged audio, the gripping story of this famous and haunting crime is brought to life by acclaimed narrator Scott Brick.
-
-
Everything I remembered about the case was wrong..
- De karen en 06-22-12
De: Vincent Bugliosi, y otros
-
The Abolitionists
- De: Kellie Carter Jackson, The Great Courses
- Narrado por: Kellie Carter Jackson
- Duración: 2 h y 31 m
- Grabación Original
-
General
-
Narración:
-
Historia
While most of us are familiar with the Underground Railroad, there was much more to the movement than helping individuals escape their bondage. In the eight lectures of The Abolitionists, Professor Kellie Carter Jackson of Wellesley College will bring you along as she traces the history of the fight to end slavery in America, from its relatively quiet origins to the turning point at Harper’s Ferry to the Civil War.
-
-
Highly Informative
- De Gilbert M. Stack en 02-23-25
De: Kellie Carter Jackson, y otros
-
Medieval Myths & Mysteries
- De: Dorsey Armstrong, The Great Courses
- Narrado por: Dorsey Armstrong
- Duración: 5 h y 6 m
- Grabación Original
-
General
-
Narración:
-
Historia
The 10 enlightening (and often humorous) lectures of Medieval Myths and Mysteries will show you how far from the “dark” times of legend these centuries were. Uncover the facts about the Knights Templar. Reveal the truth behind the tales of legendary creatures like the Questing Beast and the unicorn. Trace the events of the Black Death and the ways it altered the world in its wake, and much more. With Professor Armstrong, you will dig deep into the ways that later generations reshaped the narrative of the medieval years and perpetuated the myths.
-
-
Interesting, but centered on Britain
- De Ximena en 04-10-20
De: Dorsey Armstrong, y otros
-
I Thought It Was Just Me (but it isn’t)
- Telling the Truth about Perfectionism, Inadequacy, and Power
- De: Brené Brown
- Narrado por: Lauren Fortgang
- Duración: 10 h y 44 m
- Versión completa
-
General
-
Narración:
-
Historia
Based on seven years of ground-breaking research and hundreds of interviews, I Thought It Was Just Me shines a long-overdue light on an important truth: Our imperfections are what connect us to each other and to our humanity. Our vulnerabilities are not weaknesses; they are powerful reminders to keep our hearts and minds open to the reality that we're all in this together.
-
-
I'm sure its great if you are a mother ....
- De Leslie A Hill en 08-09-11
De: Brené Brown
Las personas que vieron esto también vieron...
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- De Gilan en 01-31-25
De: Matthew K. Sharp, y otros
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- De: Roger A. Grimes
- Narrado por: Jonathan Todd Ross
- Duración: 10 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
-
Please stop reading the urls
- De Jonathan en 11-16-19
De: Roger A. Grimes
-
A Vulnerable System
- The History of Information Security in the Computer Age
- De: Andrew J. Stewart
- Narrado por: Rick Adamson
- Duración: 10 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.
-
-
Would have been a good paper.
- De Mr. Magnanimous en 03-08-25
-
Navigating the Cybersecurity Career Path
- Insider Advice for Navigating from Your First Gig to the C-Suite
- De: Helen Patton
- Narrado por: Leslie Howard
- Duración: 7 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security team is even more difficult. In Navigating the Cybersecurity Career Path, decorated chief information security officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams.
-
-
This is cyber security not minority politics.
- De Mama en 02-06-25
De: Helen Patton
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- De: P. W. Singer, Allan Friedman
- Narrado por: Sean Pratt
- Duración: 11 h y 29 m
- Versión completa
-
General
-
Narración:
-
Historia
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- De Pascal en 03-04-17
De: P. W. Singer, y otros
-
The Art of Deception
- Controlling the Human Element of Security
- De: Kevin Mitnick
- Narrado por: Nick Sullivan
- Duración: 13 h y 41 m
- Versión completa
-
General
-
Narración:
-
Historia
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- De James S. en 02-01-21
De: Kevin Mitnick
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- De Gilan en 01-31-25
De: Matthew K. Sharp, y otros
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- De: Roger A. Grimes
- Narrado por: Jonathan Todd Ross
- Duración: 10 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
-
Please stop reading the urls
- De Jonathan en 11-16-19
De: Roger A. Grimes
-
A Vulnerable System
- The History of Information Security in the Computer Age
- De: Andrew J. Stewart
- Narrado por: Rick Adamson
- Duración: 10 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.
-
-
Would have been a good paper.
- De Mr. Magnanimous en 03-08-25
-
Navigating the Cybersecurity Career Path
- Insider Advice for Navigating from Your First Gig to the C-Suite
- De: Helen Patton
- Narrado por: Leslie Howard
- Duración: 7 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security team is even more difficult. In Navigating the Cybersecurity Career Path, decorated chief information security officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams.
-
-
This is cyber security not minority politics.
- De Mama en 02-06-25
De: Helen Patton
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- De: P. W. Singer, Allan Friedman
- Narrado por: Sean Pratt
- Duración: 11 h y 29 m
- Versión completa
-
General
-
Narración:
-
Historia
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- De Pascal en 03-04-17
De: P. W. Singer, y otros
-
The Art of Deception
- Controlling the Human Element of Security
- De: Kevin Mitnick
- Narrado por: Nick Sullivan
- Duración: 13 h y 41 m
- Versión completa
-
General
-
Narración:
-
Historia
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- De James S. en 02-01-21
De: Kevin Mitnick
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Dark Territory
- The Secret History of Cyber War
- De: Fred Kaplan
- Narrado por: Malcolm Hillgartner
- Duración: 9 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
As cyber attacks dominate front-page news, as hackers join the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan.
-
-
Best narrator - Malcolm Hillgartner
- De Greg Davis en 07-20-16
De: Fred Kaplan
-
Hacking for Dummies, 7th Edition
- De: Kevin Beaver CISSP
- Narrado por: Tom Perkins
- Duración: 11 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- De Amazon Customer en 12-25-22
-
Social Engineering, Second Edition
- The Science of Human Hacking
- De: Christopher Hadnagy
- Narrado por: Christopher Hadnagy
- Duración: 9 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- De RM en 04-10-19
-
User Story Mapping
- Discover the Whole Story, Build the Right Product
- De: Jeff Patton, Peter Economy - foreword
- Narrado por: Roy McCrerey
- Duración: 8 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
User story mapping is a valuable tool for software development, once you understand why and how to use it. This insightful book examines how this often misunderstood technique can help your team stay focused on users and their needs without getting lost in the enthusiasm for individual product features. Author Jeff Patton shows you how changeable story maps enable your team to hold better conversations about the project throughout the development process. Your team will learn to come away with a shared understanding of what you’re attempting to build and why.
-
-
Straw man arguments and handwaving
- De Amazon Customer en 01-02-22
De: Jeff Patton, y otros
-
The CISO's Guide to Securing Artificial Intelligence
- De: Russell Nomer
- Narrado por: Virtual Voice
- Duración: 28 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
The CISO's Guide to Securing Artificial Intelligence is an essential resource for cybersecurity professionals and CISOs seeking to navigate the complex landscape of AI security. Written by Russell D. Nomer, CISSP, a renowned expert in the field, this comprehensive guide provides practical insights and strategies to effectively protect AI systems from evolving threats. Published by Russell Nomer Consulting, Inc., it is a trusted source of knowledge and expertise in the cybersecurity industry. With the rapid adoption of AI across industries, it is imperative for organizations to understand ...
De: Russell Nomer
Lo que los oyentes dicen sobre Cyber Crisis
Calificaciones medias de los clientesReseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- Amazon Customer
- 03-19-22
Great info!
I have always admired Dr. Cole and he did not disappoint me with this book.
Great read for all levels
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Carlos Rodriguez
- 07-17-21
Lots of good true stories
Dr. Cole uses many facts and true stories to help the reader understand the risk and he also provides practical examples of how to treat such risk. I thought about four star because I think that the book sometimes uses a bint of FUD but being in the space I cannot negate the facts.
Great book for your executive leadership team.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- elitegunslinger
- 04-27-22
Great insightful resource
Concise and straight to the point, great examples and suggestions to secure an environment from a high level. Check this out, you won't regret it.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Amazon Customer
- 11-13-21
Extremely Informative and Insightful
I’ve been working in IT for over 25 years specifically in the Application Integration space and this book has increased my awareness to the cyber security challenges we are facing globally. I highly recommend!
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- netusera
- 02-18-25
Industry Best Practices
Cyber security cannon
slightly paranoid but for great reason
Lovk up your computer they got haxors out here just hacking people
It is not your fault cyber security suck at the places you work and do business BUT it is your responsibility to protect yourself.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Steve Bostedor
- 09-11-22
Not garbage but also not great
This book is a good starting point but the philosophies for security are a bit dated for it to have been written in 2021. There is no mention of Zero Trust principles. Least privilege was only suggested for third party accounts on your network.
The security model that is discussed is very old school network-centric. It focuses on firewalls and segmentation as the perimeter deference instead of the more modern approach of identity being the deciding perimeter. Network segmentation and firewalling is still very important in the layered approach but is no longer good enough to be the deciding factor of what is trusted and what is not. This book does not seem to acknowledge that.
If you do buy and read this book, please keep in mind that there is a new modern way to secure your assets and you should look deeply into the Zero Trust methodology where every resource request begins with a trust level of zero and increases by verifying explicitly that the request is coming from a verified account, a device that is secure, a location that is approved, and without a heuristics score that puts it all into question. We no longer trust the fact that they are on the corp network or using a company laptop or have the right password as sole trust factors. Assume that your most trusted network segments are already breached with no ability to clean them, and act accordingly.
This book also fails to talk about the modern move to passwordless authentication. There is a slight mention of tokens and multifactor but not in the context of eliminating the password from the mix all together; which is what modern enterprises are striving for. The only people who love passwords are the hackers (and apparently Eric Cole).
I don't want to discourage you from reading this book but I do want to encourage you to not make this the last book you read on this subject.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña