Zero Trust Networks: Building Secure Systems in Untrusted Networks Executive Summary Ken Thompson was the co-winner of the 1983 Turing Award. While...
Small Business Cyber Security Book written by Adam Anderson and Tom Gilkeson Book review by Rick Howard...
Learn Social Engineering Book written by Dr. Erdal Ozkaya Book review by Ann Johnson Executive Summary...
What the World Needs to Learn from Silicon Valley to Survive the Digital Era Book written by Jedidiah Yueh Book review by Paul Calatayud Executive Summary...
No More Magic Wands: Transformative Cybersecurity Change for Everyone Book written by George Finney Book review by Ron Woerner Executive Summary There...
Exponential Organizations Book written by Michael S. Malone, Salim Ismail, and Yuri van Geest Book review...
Take Back Control of Your Cybersecurity Now: Game Changing Concepts on AI and Cyber Governance Solutions for Executives Book written by Christophe Veltsos and Paul A. Ferrillo Book review by Ron...
Design for How People Think Book written by John Whalen Book review by William Yurek Bottom Line: I don't...
The Cyber Conundrum Book written by Peter K. Chronis Book review by M.K Palmore Bottom Line: I don’t...
The Perfect Weapon: War, Sabotage and Fear in the Cyber Age Book Written by: David Sanger Book reviewed by: U.S. Army Major General (Retired...