Posted on Jun 13, 2018
Summer is a great time to catch up on reading at the beach. Here are my six recommendations for books, related to cyber security, which I couldn’t put down.
The weakest link in any security system is always a human. Kevin Mitnick is a master of social engineering, and this book gives a great introduction to that subject, which is peppered with real-life exploitation examples.
It’s a fascinating account of how Russ Ulbricht built The Silk Road (a dark web market place for drugs), and what techniques the authorities used to trace and catch him.
The Stuxnet worm caused substantial damage to Iran’s nuclear program, and used unprecedented four zero-day exploits to propagate. This book examines the intersection of infrastructure and malware, and the growing threat of cyber weapons.
A well written narrative by investigative journalist Brian Krebs about how spammers make money, and how ransomware, scareware and various payment scams work.
This is one of my long-time favorites: a useful and accessible tutorial by Chris McNab about how to assess the security of networks.
This book about leadership by Gen Stanley McChrystal offers many great ideas on organizing effective teams (including security teams, operating within a larger organization).
It also talks about resilience vs. robustness and how companies can handle the complexity of the environment we operate in. While it’s not purely a cybersecurity book, I found the ideas in it incredibly useful.
Check out our list of 3 top third party risk management (TPRM) challenges, and the actions you can take to bolster your program. Learn more.
Performing cybersecurity risk assessments is a key part of any organization’s information security management program. Read our guide.
Templates and vendor evaluations are needed to level that playing field, in a time efficient and fair way, so that the best vendors are chosen.
No waiting, 100% Free
Get your free scorecard and learn how you stack up across 10 risk categories. Answer a few simple questions and we'll instantly send your score to your business email.
In today’s world in which cybersecurity breach news is commonplace, organizations are realizing the importance of addressing IT risks to their own infrastructure as well as third-party risks from vendors and partners.