Online threats have drawn every business into a cyber war with hackers. The unfortunate reality for every CEO is that a cyber attack can cost them their job, or worse, lead to the downfall of an entire company. This book aims to arm corporate leaders with the weapons to fight back. The reader will be equipped with the tools to create and implement a comprehensive cyber risk management program. The multi-faceted approach provides a unique perspective from both the hacker and the victim's lens. This book provides key insights into the latest hacking techniques, technology defense, privacy law, government initiatives, insurance risk transfer products , best practices in data breach response and predictions into the future of the "Internet of Things".
Want to join the technological revolution that’s taking the world of finance by storm? Mastering Bitcoin is your guide through the seemingly complex world of bitcoin, providing the requisite knowledge to help you participate in the internet of money. Whether you’re building the next killer app, investing in a startup, or simply curious about the technology, this practical book is essential reading.
Bitcoin, the first successful decentralized digital currency, is still in its infancy and it’s already spawned a multi-billion dollar global economy. This economy is open to anyone with the knowledge and passion to participate. Mastering Bitcoin provides you with the knowledge you need (passion not included).
Continue reading “Mastering Bitcoin: Unlocking Digital Cryptocurrencies”
The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain.
With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected utilityvrational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level.
Continue reading “The Decision to Attack: Military and Intelligence Cyber Decision-Making (Studies in Security and International Affairs Ser.)”
You already have the tools to make a threat intel program! With the growing number of threats against companies, threat intelligence is becoming a business essential. This book will explore steps facts and myths on how to effectively formalize and improve the intel program at your company by:
* Separating good and bad intelligence
Continue reading “Effective Threat Intelligence: Building and running an intel team for your organization”
DARKNET, ANONYMITY & LAW
Over the last few years, we have begun to hear more frequent mention of the darknet in the mainstream media. Increasingly now we are finding that media is reporting about different aspects of the darknet. This is also coupled with the fact that a majority of stakeholders still do not want to believe in the existence of the darknet. This is notwithstanding the fact that darknet as a phenomenon and paradigm distinctly exists. Darknet is getting more and more center-stage attention with the passage of time.
Continue reading “DARKNET, ANONYMITY & LAW”