Summary of Andy Greenberg's Sandworm
Written by Milkyway Media
Narrated by Digital Voice Mary G
4/5
()
About this audiobook
This audiobook is narrated by a digital voice.
Listen now to get the main key ideas from Andy Greenberg's Sandworm.
The automation of the modern world has made our lives easier, but it has also introduced new threats to the stability of our society. In Sandworm (2019), technology journalist Andy Greenberg takes an in-depth look at the rise of state-sponsored hacking and how it endangers national security. Greenberg uses the story of the Russian hacking group Sandworm, which has been linked to several high-profile cyberattacks, to open our eyes to a new battle that reaches into our homes, governments, and infrastructure.
More audiobooks from Milkyway Media
Summary of Dan Martell's Buy Back Your Time Rating: 5 out of 5 stars5/5Summary of Michael Nehls's The Indoctrinated Brain Rating: 5 out of 5 stars5/5Summary of Noah Kagan's Million Dollar Weekend Rating: 0 out of 5 stars0 ratingsSummary of Steven Bartlett's The Diary of a CEO Rating: 5 out of 5 stars5/5Summary of Mary Claire Haver's The Galveston Diet Rating: 5 out of 5 stars5/5Summary of Rick Rubin's The Creative Act Rating: 5 out of 5 stars5/5Summary of Cal Newport's Slow Productivity Rating: 0 out of 5 stars0 ratingsSummary of Ali Abdaal's Feel Good Productivity Rating: 5 out of 5 stars5/5Summary of Mustafa Suleyman's The Coming Wave Rating: 0 out of 5 stars0 ratingsSummary of Gabor Maté's Scattered Minds Rating: 5 out of 5 stars5/5Summary of Will Guidara's Unreasonable Hospitality Rating: 5 out of 5 stars5/5Summary of David Brooks's How to Know a Person Rating: 0 out of 5 stars0 ratingsSummary of Charles Duhigg's Supercommunicators Rating: 0 out of 5 stars0 ratingsSummary of Nassim Nicholas Taleb's Antifragile Rating: 0 out of 5 stars0 ratingsSummary of David Goggins's Never Finished Rating: 0 out of 5 stars0 ratingsSummary of Mathew Micheletti's The Inner Work Rating: 0 out of 5 stars0 ratingsSummary of Robert M. Sapolsky's Determined Rating: 5 out of 5 stars5/5Summary of Ryan Holiday's Discipline Is Destiny Rating: 5 out of 5 stars5/5Summary of Gabor Maté's The Myth of Normal Rating: 0 out of 5 stars0 ratingsSummary of Charles T. Munger's Poor Charlies Almanack Rating: 0 out of 5 stars0 ratingsSummary of Shane Parrish's Clear Thinking Rating: 5 out of 5 stars5/5Summary of Abigail Shrier's Bad Therapy Rating: 5 out of 5 stars5/5Summary of Gary Taubes's Rethinking Diabetes Rating: 0 out of 5 stars0 ratingsSummary of Chris van Tulleken’s Ultra-Processed People Rating: 5 out of 5 stars5/5Summary of Benjamin Bikman & Jason Fung's Why We Get Sick Rating: 0 out of 5 stars0 ratingsSummary of Carol Tavris & Avrum Bluming's Estrogen Matters Rating: 0 out of 5 stars0 ratingsSummary of Roxie Nafousi's Manifest Rating: 0 out of 5 stars0 ratingsSummary of Julie Smith’s Why Has Nobody Told Me This Before? Rating: 5 out of 5 stars5/5Summary of James DiNicolantonio's The Obesity Fix Rating: 0 out of 5 stars0 ratingsSummary of Arthur C. Brooks & Oprah Winfrey's Build the Life You Want Rating: 0 out of 5 stars0 ratings
Related to Summary of Andy Greenberg's Sandworm
Related audiobooks
Digital Earth: Cyber threats, privacy and ethics in an age of paranoia Rating: 0 out of 5 stars0 ratingsA Vulnerable System: The History of Information Security in the Computer Age Rating: 5 out of 5 stars5/5Cyber Warfare in 2022+ Rating: 0 out of 5 stars0 ratingsBiggest Cyber Crimes in the History Rating: 5 out of 5 stars5/5Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Schneier on Security Rating: 4 out of 5 stars4/5Cybersecurity Handbook for Small to Mid-size Businesses Rating: 0 out of 5 stars0 ratingsZero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratingsCISSP: Tips and Tricks to Learn and Study about Information Systems Security from A-Z Rating: 4 out of 5 stars4/5Threats: What Every Engineer Should Learn From Star Wars Rating: 5 out of 5 stars5/5Global Warning Rating: 0 out of 5 stars0 ratingsJK's Code Rating: 0 out of 5 stars0 ratingsGod of the Internet Rating: 3 out of 5 stars3/5Recycling Rating: 5 out of 5 stars5/5Twenty-Twenty Hindsight Rating: 0 out of 5 stars0 ratingsTech for Life – Putting trust back in technology Rating: 0 out of 5 stars0 ratingsCloud Security & Forensics Handbook: Dive Deep Into Azure, AWS, And GCP Rating: 0 out of 5 stars0 ratingsStrategy in the Digital Age: Mastering Digital Transformation Rating: 0 out of 5 stars0 ratingsThe Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes Rating: 0 out of 5 stars0 ratingsNIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 5 out of 5 stars5/5Of Privacy and Power: The Transatlantic Struggle over Freedom and Security Rating: 4 out of 5 stars4/5The Missing Training Manual Rating: 0 out of 5 stars0 ratingsThe Battle for Your Computer: Israel and the Growth of the Global Cyber- Security Industry Rating: 0 out of 5 stars0 ratingsThe Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Rating: 0 out of 5 stars0 ratingsDigital Dynamo: Mastering Online Marketing for Ultimate Success Rating: 0 out of 5 stars0 ratingsThe Knowledge Work Factory: Turning the Productivity Paradox into Value for Your Business Rating: 4 out of 5 stars4/5
Security For You
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsHacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Certified Information Security Manager CISM Study Guide Rating: 0 out of 5 stars0 ratingsProject Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Hackers & Painters: Big Ideas from the Computer Age Rating: 4 out of 5 stars4/5Through the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 5 out of 5 stars5/5Darknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Governance of Enterprise IT based on COBIT 5: A Management Guide Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5Bitcoin for Beginners & Dummies: Cryptocurrency & Blockchain Rating: 4 out of 5 stars4/5The Wires of War: Technology and the Global Struggle for Power Rating: 4 out of 5 stars4/5
Reviews for Summary of Andy Greenberg's Sandworm
1 rating0 reviews