"I Have Nothing to Hide" and 20 Other Myths About Surveillance and Privacy Book written by Heidi Boghosian Book review by Ben Smith Bottom Line I don’t...
How to Measure Anything in Cybersecurity Risk, 2nd Edition Book written by Douglas W. Hubbard and Richard Seiersen Book review by Rick...
Cybersecurity First Principles: A Reboot of Strategy and Tactics Book written by Rick Howard Book review by Helen Patton Bottom Line: I...
Cyber Mayday and the Day After Book written by Dan Lohrmann and Shamane Tan Book review by Ben Smith...
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us Book written by Eugene H. Spafford, Leigh Metcalf and Josiah Dykstra Book...
Cyber Defense Matrix: The Essential Guide to Navigating the Cybersecurity Landscape Book written by Sounil Yu Book review by Rick Howard Bottom Line I...
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Book written by George Finney Book review by Rick Howard Bottom Line...
Breached! Why Data Security Law Fails and How to Improve It Book written by Daniel J. Solove and Woodrow Hartzog Book review by Ben...
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) Book written by Andrew Bochman and Sarah Freeman Book review by Georgianna Shea...
The Cybersecurity Path: Insider Advice to Navigate a Successful Career in Security from Beginning to End Book written by Helen Patton Book review by Rick Howard Bottom Line I recommend...