Book Review: “Cryptonomicon” by Neal Stephenson (1999)
Executive SummaryCryptonomicon is the quintessential hacker novel. The author, Neal Stephenson, describes a story that is set around the intersection between the discovery of world-changing math...
View ArticleBook Review: "Security Metrics: Replacing Fear, Uncertainty, and Doubt" by...
Executive SummaryThis book is a must-read for all cyber security professionals. It is not a part of the canon because it attacks a sacred cow of the industry—Annualized Loss Expectancy (ALE) as a means...
View ArticleBook Review: “Confront and Conceal: Obama’s Secret Wars and Surprising Use of...
Executive SummaryThis book is an interesting read for foreign policy buffs but a must-read for cyber security professionals interested in the evolution of cyber warfare. It is the first published book...
View ArticleBook Review: "Reamde" by Neil Stephenson (2011)
Executive SummaryWith Reamde, the author of Snow Crash and Cryptonomicon, Neal Stephenson, delivers a high octane, straight-up cyber thriller along the same lines as Mark Russinovich’s Zero Day and...
View ArticleBook Review: The Blue Nowhere by Jeffery Deaver (2001)
Executive Summary The Blue Nowhere is a cyber thriller set in the time of the Internet bubble of the 1990s. Jeffery Deaver is an accomplished novelist who knows how to tell a story, and he does a...
View ArticleBook Review: Worm: The First Digital World War by Mark Bowden (2011)
Executive SummaryWritten by the author of Black Hawk Down: A Story of Modern Warfare, Mark Bowden, Worm: The First Digital World War is the story of how the cyber security community came together to do...
View ArticleAlan Turing and "The Imitation Game"
Executive SummaryThe Alan Turing story is so fantastic that it was inevitable that somebody should make a movie about it. His life is both inspiring and terrifying. I am amazed at the paradigm-shifting...
View ArticleBook Review: Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime...
Executive SummaryKingpin tells the story of the rise and fall of a hacker legend: Max Butler. Butler is most famous for his epic, hostile hacking takeover in August 2006 of four of the criminal...
View ArticleBook Review: Daemon (2006) and Freedom™ (2010) by Daniel Suarez
Executive SummaryIf you appreciate hacking stories like The Girl with the Dragon Tattoo or gaming stories like Ready Player One or stories that combine both like Reamde, you will love Daniel Suarez’s...
View ArticleBook Review: Fatal System Error: The Hunt for the New Crime Lords Who Are...
Executive SummaryIf you are interested in the evolution of cyber crime, Fatal System Error is a good first reference. The author, Joseph Menn, is able to capture the early years as the cyber criminal...
View ArticleBook Review: The Girl with the Dragon Tattoo (2005) by Stieg Larsson
Executive SummaryYou have heard of this book from watching one or both of the movies that have sprung from it, but do yourself a favor: take the time to read through this one. It is a fantastic story...
View Article8 Tips For Dealing With Heartbleed Right Now
This has been a fun two weeks. We have not had a significant cyber event like this, an event that affects just about everybody on the Internet, since the Kaminsky DNS vulnerability of 2008. [1]...
View ArticleBook Review: Secrets and Lies: Digital Security in a Networked World (2000)...
Executive SummarySecrets and Lies: Digital Security in a Networked World is the perfect book to hand to new bosses or new employees coming in the door who have not been exposed to cyber security in...
View ArticleBook Review: No Place to Hide: Edward Snowden, the NSA, and the U.S....
Executive SummaryNo Place to Hide is a strange concoction: part exposé, part autobiography, and part screed “against the man.” It is not what I would call an example of rigorous journalistic reporting....
View ArticleBook Review: Lexicon (2013) by Max Barry
Executive SummaryLexicon is an exciting story that is really about social engineering taken to the nth degree. It is not a cyber security canon candidate, however, because it does not meet the criteria...
View ArticleWhy I Vote
Executive SummaryThis Tuesday, the people of the United States will vote for 36 Senators, 435 Congressional Representatives, 36 State Governors and three Territorial Governors. In order for Republicans...
View ArticleBook Review: The Practice of Network Security Monitoring: Understanding...
Executive SummaryRichard Bejtlich is one of the most respected security practitioners in the community. If he publishes something, we should all take notice. In The Practice of Network Security...
View ArticleBook Review: Spam Nation: The Inside Story of Organized Cybercrime - from...
Executive SummaryIn Spam Nation, Brian Krebs covers a key portion of our cyber security and cyber crime history: 2007–2013, that period when we started to learn about the Russian Business Network,...
View ArticleBook Review: Winning as a CISO (2005) by Rich Baich
Executive SummaryThe latest candidate for the cyber security canon is Rich Baich’s Winning as a CISO. The roles of the chief information officer (CIO), the chief security officer (CSO), and the chief...
View ArticleBook Review: Countdown to Zero Day: Stuxnet and the Launch of the World's...
Executive SummaryOperation Olympic Games is the US military code name that refers to the first ever act of real cyber warfare. Many journalists have told bits and pieces of the story since the attacks...
View Article
More Pages to Explore .....