Book Excerpts

Author Q&A: In modern cyberwarfare ‘information security’ is one in the same with ‘national security’
What exactly constitutes cyberwarfare? The answer is not easy to pin down. On one hand, one could argue that cyber criminals are waging an increasingly debilitating economic war on consumers and businesses ...

AUTHOR Q&A: New book, ‘Hackable,’ suggests app security is the key to securing business networks
bacohido | | Best Practices, Book Excerpts, For Consumers, For Technologists, Privacy, Steps forward, Top Stories
The cybersecurity operational risks businesses face today are daunting, to say the least. Related: Embedding security into DevOps. Edge-less networks and cloud-supplied infrastructure bring many benefits, to be sure. But they also ...

SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers
It’s difficult to convey the scope and scale of cyber attacks that take place on a daily basis, much less connect the dots between them.Related: The Golden Age of cyber spyingA new ...

BOOK REVIEW: ‘Security Yearbook’ preserves cybersecurity history — highlights tectonic shift
Along with Richard Stiennon, I belong to a small circle of journalists and tech industry analysts who’ve been paying close attention to cybersecurity since Bill Gates curtailed commercial work on Windows to ...

GUEST ESSAY: Strategic tactics are key to a robust Cloud Security Posture Management regime
A cyber strategy is a documented approach to handling various aspects of cyberspace. It is mostly developed to address the cybersecurity needs of an entity by focusing on how data, networks, technical ...

GUEST ESSAY: The true cost of complacency, when it comes to protecting data, content
Facebook was lucky when the Information Commissioner’s Office (ICO)—the UK’s independent authority set up to uphold information rights in the public interest—hit the U.S. social media company with a £500,000 fine. Related: ...