The Cyber Conundrum: How Do We Fix Cybersecurity?
Written by Peter K. Chronis
Narrated by Keith Sellon-Wright
4/5
()
About this audiobook
The 2016 presidential election was chaotic for many reasons. Perhaps the most troubling was news that a foreign power used new cyber warfare tactics to influence our views and skew the election. These new revelations come to light as many grow weary of a new reality where hackers always seem to be one step ahead of us.
Author Peter K. Chronis claims we need a “moonshot” to bolster our cybersecurity — an astonishing achievement on the scale of wiping out polio, defeating the Nazis, or landing on the moon. The author uses inspiration and lessons from these other complex “moonshots” as a guide to help us develop a comprehensive cybersecurity strategy.
Written with a nontechnical audience in mind, The Cyber Conundrum examines the many flaws in global cybersecurity strategy and proposes solutions the tech industry, governments, and companies need to explore to address fundamental cybersecurity challenges.
Without fundamental change, our democratic institutions, the critical services we rely on every day (electricity, communications, financial institutions and more), and the free flow of information are in jeopardy — making this an issue important to everyone.
Related to The Cyber Conundrum
Related audiobooks
Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5CYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsCyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Schneier on Security Rating: 4 out of 5 stars4/5Becoming an Ethical Hacker Rating: 5 out of 5 stars5/5Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth Rating: 4 out of 5 stars4/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5The New Normal in IT: How the Global Pandemic Changed Information Technology Forever Rating: 0 out of 5 stars0 ratingsThe Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age Rating: 4 out of 5 stars4/5A Vulnerable System: The History of Information Security in the Computer Age Rating: 5 out of 5 stars5/5The Wires of War: Technology and the Global Struggle for Power Rating: 4 out of 5 stars4/5The Digital Silk Road: China's Quest to Wire the World and Win the Future Rating: 5 out of 5 stars5/5We Have Root: Even More Advice from Schneier on Security Rating: 5 out of 5 stars5/5Spies, Lies, and Algorithms: The History and Future of American Intelligence Rating: 5 out of 5 stars5/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5Cyber War...and Peace: Building Digital Trust Today with History as Our Guide Rating: 3 out of 5 stars3/5Trafficking Data: How China is Winning the Battle for Digital Sovereignty Rating: 5 out of 5 stars5/5The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Rating: 5 out of 5 stars5/5Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence Rating: 5 out of 5 stars5/5Digital Earth: Cyber threats, privacy and ethics in an age of paranoia Rating: 0 out of 5 stars0 ratingsCyber Privacy: Who Has Your Data and Why You Should Care Rating: 2 out of 5 stars2/5The Internet Things Rating: 4 out of 5 stars4/5Hackable: How to Do Application Security Right Rating: 0 out of 5 stars0 ratingsCybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity Rating: 0 out of 5 stars0 ratingsSpam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door Rating: 4 out of 5 stars4/5
Security For You
Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsTor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5Through the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 5 out of 5 stars5/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World Rating: 4 out of 5 stars4/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Darknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Social Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5Blockchain and the Law: The Rule of Code Rating: 4 out of 5 stars4/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age Rating: 4 out of 5 stars4/5
Reviews for The Cyber Conundrum
2 ratings0 reviews