Categories
Education Ransomware Reading Technology

Latest Read: Fighting Phishing

Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing by Roger A. Grimes.

Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing by Roger Grimes

Roger holds a BA in Accounting and Economics from Old Dominion University. A former Principal Security Architect at Microsoft, Roger was a computer security columnist at InfoWorld. Today Roger is a Data-Driven Defense Evangelist at KnowBe4.

This book is not only mandatory reading for every IT organization’s team, but even individuals must learn to protect their personal accounts and valuable data safe sophisticated social engineering and phishing attacks.

This book is well regarded within the cybersecurity community. This is a practical guide to understanding and defending against phishing attacks. Roger is in fact, outlining how an in-depth approach is required, now more than ever, to deploy a robust defense against social engineering and phishing threats.
Anyone can acquire the understanding of how critical defenses must be in place today. So, just search for ‘phishing attack’ to clearly understand how organizations still fall victim to these attacks which continue to be the entry into organizational networks and systems.

Categories
Education Reading

Latest Read: Digital Earth

Digital Earth: Cyber Threats, Privacy and Ethics in an Age of Paranoia by Sarah Katz. She is currently a Cybersecurity Technical Writer at Microsoft.

Digital Earth: Cyber threats, privacy and ethics in an age of paranoia by Sarah Katz

Sarah holds Master of Arts, Terrorism and Counterterrorism Operations from Middlebury Institute of International Studies at Monterey and a PhD in Cyberpsychology from Capitol Technology University. Sarah has been published in Cyber Defense Magazine, Dark Reading, Infosecurity Magazine, and ISACA Journal.

On the surface this book may appear not to be for organizational leaders, it actually belongs in the hands of your organization’s CIO, Finance, Legal, Risk Management and of course CISO. However this is for your leadership. Sarah has written a well researched book addressing key cybersecurity threats. This should be review by any organization’s entire technology division. In fact, this extends well beyond any organization’s IT Division or dedicated team. You’ll see why.

This is a perfect read for anyone studying or holding an interesting in cybersecurity career fields. Sarah provides in depth research from well established cybersecurity firms, Homeland Security, and research institutions both in private and public sectors.