Categories
Cyberinfrastructure Education Reading

Latest Read: Code of Honor

The Code of Honor: Embracing Ethics in Cybersecurity by Ed Skoudis and Dr. Paul J. Maurer.

The Code of Honor: Embracing Ethics in Cybersecurity by Paul J. Maurer and Ed Skoudis

Ed holds a BS in Electrical Engineering from the University of Michigan and a MS in Information Networking from Carnegie Mellon. Today he is the President of the SANS Technology Institute. Paul holds a M.Div.from Gordon-Conwell Theological Seminary and PhD in Political Science from Claremont Graduate University. Today he is the President of Montreat College.

I found this to be one of the most insightful books on cybersecurity and a must read for anyone in the fields of IT, AI, or IR. Jon outlines key elements for cybersecurity teams to X: Espionage (Bletchley Park), Sabotage (Stuxnet), Subversion (2016 US Election Interference), and Cyber Power (China).

It is very welcoming to see Mariano addressing machine learning for predictive cybersecurity. Mariano introduces statistical methods and machine learning easily accessible to security teams with Bayesian inference. Examples predictive detection, anomaly identification, and early warning signs is proving how AI is moving any cybersecurity program from reactive to proactive.

Mariano is including Python scripts and Jupyter-based workflows, providing technically savvy security teams a direct path to experimentation and deployment in their internal test deployments.

This book certainly provides cybersecurity teams with a practical roadmap for driving a data-driven mindset. This can be an excellent resources for organizational leaders to understand business in the age of aggressive malware and data breach announcements.

Categories
Cyberinfrastructure Education Innovation Reading

Latest Read: Data-Driven Cybersecurity

Data-Driven Cybersecurity: Reducing risk with proven metrics by Mariano Mattei.

Data-Driven Cybersecurity Reducing risk with proven metrics by Mariano Mattei

Mariano holds a Masters in Cyber Defense and Information Security from Temple University. She is the former Director Governance, Risk, and Compliance at Layer 8 Security, and CISO at Mattei. Today Mariano is VP Cybersecurity and CISO at Azzur.

It is very welcoming to see Mariano addressing machine learning for predictive cybersecurity. Mariano introduces statistical methods and machine learning easily accessible to security teams with Bayesian inference. Examples predictive detection, anomaly identification, and early warning signs is proving how AI is moving any cybersecurity program from reactive to proactive.

Mariano is including Python scripts and Jupyter-based workflows, providing technically savvy security teams a direct path to experimentation and deployment in their internal test deployments.

This book certainly provides cybersecurity teams with a practical roadmap for driving a data-driven mindset. This can be an excellent resources for organizational leaders to understand business in the age of aggressive malware and data breach announcements.

Categories
Cyberinfrastructure Education Innovation Reading

Latest Read: Age of Deception

Age of Deception: Cybersecurity As Secret Statecraft (Cornell Studies in Security Affairs) by Jon R. Lindsay.

Age of Deception: Cybersecurity as Secret Statecraft by John Lindsey

Jon holds a PhD in political science from the Massachusetts Institute of Technology and an M.S. in computer science and B.S. in symbolic systems from Stanford University. He served in the US Navy with operational assignments in Europe, Latin America, and the Middle East. Today Jon is an Associate Professor at the School of Cybersecurity and Privacy at Georgia Tech. His research explores the role of emerging technology in global security.

I found this to be certainly one of the most insightful books on cybersecurity and a must read for anyone working in the fields of IT, AI, or IR. He reveals how cybersecurity has elevated to impact national security and international relations, resulting in secret statecraft. In fact, Jon introduces the statecraft of cybersecurity by revising Espionage (Bletchley Park), Sabotage (Stuxnet), Subversion (2016 US Election Interference), and Cyber Power (China).

He begins by updating the history of espionage at Bletchley Park. This will certainly be an amazing insight to many readers who only know the Turing story or the 2014 movie The Imitation Game, of the early efforts at Bletchley Park revealing the challenges the British faced in confronting Enigma.

Categories
Artificial Intelligence Cyberinfrastructure Education Innovation Reading

Latest Read: Inside Cyber


Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security by Chuck Brooks.

Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security by Chuck Brooks

Chuck holds an MA from the University of Chicago. He serves as President of Brooks Consulting International addressing cybersecurity, emerging technologies and government relations. Chuck also serves as an Adjunct Professor at Georgetown University in the Cyber Risk Management Program. He has briefed the G20 on energy cybersecurity, served on two National Academy of Science Advisory groups and addressed USTRANSCOM on cybersecurity.

Chuck serves on an industry/government Working group for DHS CISA focused on security space systems. Chuck is also a contributor to Forbes, The Washington Post, Dark Reading, Homeland Security Today, and Security Information Watch.

He is providing readers a roadmap for understanding the “Fourth Industrial Revolution.” The book serves as a bridge between complex technical advancements and their practical implications for business, government, and individual privacy.

Readers will learn that society is entering a new state of ”cyberflux” where digital and physical (analog) worlds are rapidly converging. This has created new vulnerabilities yet also new opportunities. He reveals AI, 5G, and related tools offer enhanced efficiencies, empowering new business models that offer new innovations across finance, healthcare, transportation, and government. He is focusing on what they do and why they matter rather than jumping into technological formulas or programming code.

Categories
Cyberinfrastructure Education Innovation Reading Technology

Latest Read: Tor

Tor: From the Dark Web to the Future of Privacy by Ben Collier.

Tor: From the Dark Web to the Future of Privacy by Ben Collier

Ben holds a MSc in Criminology and Criminal Justice from the University of Edinburgh and a PhD in Criminology from the Scottish Centre for Crime and Justice Research. He is a Cambridge Cybercrime Centre postdoctoral researcher and long-term collaborator with this interdisciplinary center, focusing on online hacker communities and cybercrime markets. Today he is a Senior Lecturer in Digital Methods at the University of Edinburgh within the Department of Science, Technology, and Innovation Studies (STIS).

The Dark Web is a subset of the internet that was designed to be hidden from search engines and requires specific software, like Tor. Well known for illegal marketplaces (Silk Road) for drugs, firearms, murder for hire, stolen data, selling breached data, and hacking services, yet in fact is also serving as a privacy resource. Here forums allow users to exchange data regarding whistleblower platforms and also permits journalists to communicate in countries with strict censorship.

Insert irony: the very markets trafficking in illicit goods today rely on a architecture engineered by the U.S. Naval Research Laboratory.