Quantcast
Channel: Terebrate
Browsing all 33 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Book Review: “Cryptonomicon” by Neal Stephenson (1999)

Executive SummaryCryptonomicon is the quintessential hacker novel. The author, Neal Stephenson, describes a story that is set around the intersection between the discovery of world-changing math...

View Article



Image may be NSFW.
Clik here to view.

Book Review: "Security Metrics: Replacing Fear, Uncertainty, and Doubt" by...

Executive SummaryThis book is a must-read for all cyber security professionals. It is not a part of the canon because it attacks a sacred cow of the industry—Annualized Loss Expectancy (ALE) as a means...

View Article

Image may be NSFW.
Clik here to view.

Book Review: “Confront and Conceal: Obama’s Secret Wars and Surprising Use of...

Executive SummaryThis book is an interesting read for foreign policy buffs but a must-read for cyber security professionals interested in the evolution of cyber warfare. It is the first published book...

View Article

Image may be NSFW.
Clik here to view.

Book Review: "Reamde" by Neil Stephenson (2011)

Executive SummaryWith Reamde, the author of Snow Crash and Cryptonomicon, Neal Stephenson, delivers a high octane, straight-up cyber thriller along the same lines as Mark Russinovich’s Zero Day and...

View Article

Image may be NSFW.
Clik here to view.

Book Review: The Blue Nowhere by Jeffery Deaver (2001)

Executive Summary The Blue Nowhere is a cyber thriller set in the time of the Internet bubble of the 1990s. Jeffery Deaver is an accomplished novelist who knows how to tell a story, and he does a...

View Article


Image may be NSFW.
Clik here to view.

Book Review: Worm: The First Digital World War by Mark Bowden (2011)

Executive SummaryWritten by the author of Black Hawk Down: A Story of Modern Warfare, Mark Bowden, Worm: The First Digital World War is the story of how the cyber security community came together to do...

View Article

Image may be NSFW.
Clik here to view.

Alan Turing and "The Imitation Game"

Executive SummaryThe Alan Turing story is so fantastic that it was inevitable that somebody should make a movie about it. His life is both inspiring and terrifying. I am amazed at the paradigm-shifting...

View Article

Image may be NSFW.
Clik here to view.

Book Review: Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime...

Executive SummaryKingpin tells the story of the rise and fall of a hacker legend: Max Butler. Butler is most famous for his epic, hostile hacking takeover in August 2006 of four of the criminal...

View Article


Image may be NSFW.
Clik here to view.

Book Review: Daemon (2006) and Freedom™ (2010) by Daniel Suarez

Executive SummaryIf you appreciate hacking stories like The Girl with the Dragon Tattoo or gaming stories like Ready Player One or stories that combine both like Reamde, you will love Daniel Suarez’s...

View Article


Image may be NSFW.
Clik here to view.

Book Review: Fatal System Error: The Hunt for the New Crime Lords Who Are...

Executive SummaryIf you are interested in the evolution of cyber crime, Fatal System Error is a good first reference. The author, Joseph Menn, is able to capture the early years as the cyber criminal...

View Article

Image may be NSFW.
Clik here to view.

Book Review: The Girl with the Dragon Tattoo (2005) by Stieg Larsson

Executive SummaryYou have heard of this book from watching one or both of the movies that have sprung from it, but do yourself a favor: take the time to read through this one. It is a fantastic story...

View Article

Image may be NSFW.
Clik here to view.

8 Tips For Dealing With Heartbleed Right Now

This has been a fun two weeks. We have not had a significant cyber event like this, an event that affects just about everybody on the Internet, since the Kaminsky DNS vulnerability of 2008. [1]...

View Article

Image may be NSFW.
Clik here to view.

Book Review: Secrets and Lies: Digital Security in a Networked World (2000)...

Executive SummarySecrets and Lies: Digital Security in a Networked World is the perfect book to hand to new bosses or new employees coming in the door who have not been exposed to cyber security in...

View Article


Image may be NSFW.
Clik here to view.

Book Review: No Place to Hide: Edward Snowden, the NSA, and the U.S....

Executive SummaryNo Place to Hide is a strange concoction: part exposé, part autobiography, and part screed “against the man.” It is not what I would call an example of rigorous journalistic reporting....

View Article

Image may be NSFW.
Clik here to view.

Book Review: Lexicon (2013) by Max Barry

Executive SummaryLexicon is an exciting story that is really about social engineering taken to the nth degree. It is not a cyber security canon candidate, however, because it does not meet the criteria...

View Article


Image may be NSFW.
Clik here to view.

Why I Vote

Executive SummaryThis Tuesday, the people of the United States will vote for 36 Senators, 435 Congressional Representatives, 36 State Governors and three Territorial Governors. In order for Republicans...

View Article

Image may be NSFW.
Clik here to view.

Book Review: The Practice of Network Security Monitoring: Understanding...

Executive SummaryRichard Bejtlich is one of the most respected security practitioners in the community. If he publishes something, we should all take notice. In The Practice of Network Security...

View Article


Image may be NSFW.
Clik here to view.

Book Review: Spam Nation: The Inside Story of Organized Cybercrime - from...

Executive SummaryIn Spam Nation, Brian Krebs covers a key portion of our cyber security and cyber crime history: 2007–2013, that period when we started to learn about the Russian Business Network,...

View Article

Image may be NSFW.
Clik here to view.

Book Review: Winning as a CISO (2005) by Rich Baich

Executive SummaryThe latest candidate for the cyber security canon is Rich Baich’s Winning as a CISO. The roles of the chief information officer (CIO), the chief security officer (CSO), and the chief...

View Article

Image may be NSFW.
Clik here to view.

Book Review: Countdown to Zero Day: Stuxnet and the Launch of the World's...

Executive SummaryOperation Olympic Games is the US military code name that refers to the first ever act of real cyber warfare. Many journalists have told bits and pieces of the story since the attacks...

View Article
Browsing all 33 articles
Browse latest View live




Latest Images