Fact is often stranger than fiction. Cybersecurity professionals know that for sure. Abacus Group’s CTO, Paul Ponzeka recommends these books to enlighten, educate and entertain cybersecurity pros and others interested in the topic.
Cyber War: The Next Threat to National Security and What to Do About It
By: Richard A. Clarke and Robert Knake
International security experts — Clarke from the nuclear generation, and Knake from the cyber generation — ponder the irony that although the U.S. pioneered the technology behind cyber warfare, outdated thinking, policies and strategies make us vulnerable to losing any cyber contest with a hostile nation. In this chilling and eye-opening book, Clarke and Knake provide a highly detailed, yet accessible look at how cyber warfare is being waged and the need to rethink our national security to face this new threat.
The Quick Guide to Cloud Computing and Cyber Security
By: Marcia R.T. Pistorious
Cloud computing has appeared in many small forms, and now it is emerging as a huge solution to the problem of the fast-changing and increasingly cyber world in which we live and work. In this book, cloud computing and cybersecurity is described in a way that covers all sizes and implementations of businesses involved in using this method of computing.
Kingdom of Lies: Unnerving Adventures in the World of Cybercrime
By: Kate Fazzini
Kingdom of Lies follows the intertwined stories of cybercriminals and ethical hackers as they jump from criminal trend to criminal trend, crisis to crisis. A cybersecurity professional turned journalist, Kate Fazzini illuminates the many lies companies and governments tell us about our security, the lies criminals tell to get ahead and the lies security leaders tell to make us think they are better at their jobs than they are.
By: Dan Griffin
Security is an advantage: The bring-your-own-device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data, from any mobile device. But IT managers are nervous about serving sensitive corporate data to devices that lack sophisticated security controls. By applying the Four Pillars of Endpoint Security, businesses can stay competitive and operate without interruption, which leads to higher productivity and business velocity.
Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
By: Kevin Mitnick, William L. Simon and Steve Wozniak
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies, and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. Ghost in the Wires is a thrilling true story of intrigue, suspense and unbelievable escape, and it’s a portrait of a visionary whose creativity, skills and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.
Cybersecurity and Cyberwar: What Everyone Needs to Know®
By: P.W. Singer and Allan Friedman
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times bestselling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of easy-to-read, yet deeply informative resource book that has been missing on this crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key areas of cyberspace and its security: how it all works, why it all matters and what we can do. Along the way, they take readers on a tour of the important (and entertaining) issues and characters of cybersecurity, from the “Anonymous” hacker group and the Stuxnet computer virus to the new cyber units of the Chinese and U.S. militaries. Cybersecurity and Cyberwar: What Everyone Needs to Know® is the definitive account on the subject for us all, which comes not a moment too soon.
The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age
By: David E. Sanger
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny and usable for a variety of malicious purposes — from crippling infrastructure to sowing discord and doubt — cyber is now the weapon of choice for democracies, dictators and terrorists.
American Kingpin: The Epic Hunt for the Criminal Mastermind Behind The Silk Road
By: Nick Bilton
In 2011, a 26-year-old libertarian programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine website hosted on the dark web, where anyone could trade anything — drugs, hacking software, forged passports, counterfeit cash, poisons — free of the government’s watchful eye. Drawing on exclusive access to key players and two billion digital words and images Ross left behind, Vanity Fair correspondent and New York Times bestselling author Nick Bilton offers a tale filled with twists and turns, lucky breaks and unbelievable close calls. It’s a story of the boy next door’s ambition gone criminal, spurred on by the clash between the new world of libertarian-leaning, anonymous, decentralized web advocates and the old world of government control, order and rule of law. Filled with unforgettable characters and capped by an astonishing climax, American Kingpin might be dismissed as too outrageous for fiction. But it’s all too real.
The Art of Deception: Controlling the Human Element of Security
By: Kevin Mitnick
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs and manuals that address the human element of security.
– Paul Ponzeka, CTO, Abacus Group