article thumbnail

Fire Doesn't Innovate by Kip Boyle (Book Review)

Adam Shostack

An unexpected book review. I hate reviewing books by people I know, because I am a picky reader, and if you can't say anything nice, don't say anything at all. I also tend to hate management books, because they often substitute jargon for crisp thinking. It is not a book for the CSO. Fire" doesn't do that.

CSO 130
article thumbnail

“Fire Doesn’t Innovate” by Kip Boyle (Book Review)

Adam Shostack

I hate reviewing books by people I know, because I am a picky reader, and if you can’t say anything nice, don’t say anything at all. I also tend to hate management books, because they often substitute jargon for crisp thinking. It is not a book for the CSO. The book is organized into two major parts.

CSO 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Use Your Asset Management Software to Reduce Cyber Risks

CyberSecurity Insiders

It will report if any modifications, upgrades, or revisions are authorized and booked by using a change management process. . They should also detect and track resources instantaneously, perform constant risk assessment, as well as immediately isolate untrustworthy resources from the entire network.

article thumbnail

International Association of Chiefs of Police (IACP) Appoints CyberSecurity Expert Witness Joseph Steinberg To Computer Crime & Digital Evidence Committee

Joseph Steinberg

He has led organizations within the cybersecurity industry for over 25 years, and has written books ranging from the best-selling Cybersecurity for Dummies to the official study guide from which many CISOs study for certification exams in advanced information security management. patent filings.

article thumbnail

7 Insights About Managing Cyber Risk You Can’t Afford To Miss

Jane Frankland

It puts you in a better position to ascertain which strategies you’ll use to accept, avoid, transfer and limit risk. Numerous studies have documented how men and women gauge risk differently. It’s something I wrote extensively about in my book, IN Security. Please share with me your insights for managing cyber risk.

article thumbnail

Episode 241: If Its Smart, Its Vulnerable a Conversation with Mikko Hyppönen

The Security Ledger

We speak with Mikko Hyppönen on the sidelines of the DEF CON Conference in Las Vegas to talk about his new book, “If its Smart it Vulnerable.". We speak with Mikko Hyppönen on the sidelines of the DEF CON Conference in Las Vegas to talk about his new book, “If its Smart it Vulnerable." Click the icon below to listen.

article thumbnail

Securing Success: The Crucial Role of a Cybersecurity Specialist in a Growing Business

Joseph Steinberg

Likewise, information systems have allowed businesses to experience tremendous growth – today’s businesses face threats that, only a few decades ago, were the subject of solely science fiction books and movies. When it comes to cybersecurity the same is true – you need a cyber security if you want to competently address cyber risk.